Dirty Frag: Universal Linux LPE
Researcher Hyunwoo Kim (@v4bel) dropped a working root exploit for all major Linux distros before any patch exists—embargo broken, PoC live, CVE assigned but unpatched.
What Matters
- Chains xfrm-ESP Page-Cache Write (CVE-2026-43284, patched mainline) with RxRPC Page-Cache Write (CVE-2026-43500, no patch anywhere yet).
- xfrm-ESP bug has been exploitable since commit cac2661c53f3 on 2017-01-17—roughly 9 years of exposure.
- No race condition required; deterministic logic bug means near-100% success rate and no kernel panic on failure.
- Bypasses the publicly known Copy Fail mitigation (algif_aead blacklist); same sink, different trigger path.
- Tested confirmed-working on Ubuntu 24.04.4, RHEL 10.1, openSUSE Tumbleweed 7.0.2, Fedora 44, AlmaLinux 10, CentOS Stream 10.
- Immediate mitigation: blacklist esp4, esp6, rxrpc modules via /etc/modprobe.d/dirtyfrag.conf and drop page cache; one shell command provided.
-
After exploit runs, page cache is contaminated; must run
echo 3 > /proc/sys/vm/drop_cachesor reboot to restore stability.