TL;DR
Researchers revealed ‘Dirty Frag,’ a Linux kernel privilege escalation chain affecting major distributions since 2017. Exploits impact containerized and traditional environments, prompting urgent mitigation efforts.
A new Linux kernel privilege escalation chain called ‘Dirty Frag’ has been publicly disclosed, affecting most major Linux distributions since 2017. Discovered by Hyunwoo Kim (@v4bel), this vulnerability allows unprivileged local users to escalate privileges to root by chaining two kernel sub-vulnerabilities. The disclosure was made after the embargo was broken by an unrelated third party, revealing the exploit code and raising immediate security concerns.
‘Dirty Frag’ involves two sub-vulnerabilities: the xfrm-ESP Page-Cache Write in the IPsec ESP decryption paths and the RxRPC Page-Cache Write in the RxRPC module. Both stem from a flaw in the kernel’s handling of zero-copy send paths, where splice() references a page cache page that the attacker only has read access to, leading to in-place modification of file data in RAM. When chained, these vulnerabilities enable an attacker to achieve root privileges on most Linux distributions dating back to 2017.
The vulnerability was discovered by Hyunwoo Kim and was disclosed prematurely after the embargo was broken. No CVE identifier has been assigned due to the embargo breach, but the exploit code is now publicly available. The affected kernel modules include esp4, esp6, and rxrpc, which are integral to IPsec VPNs and certain network services.
Mitigation strategies include denylisting and unloading the vulnerable modules, applying live patches where available, and installing patched kernels from testing repositories. However, these measures may impact network or filesystem operations dependent on IPsec or RxRPC. System administrators are advised to assess their environment before applying mitigations.
Why It Matters
This vulnerability is significant because it affects a broad range of Linux systems, including servers, desktops, and containerized environments. The chain of sub-vulnerabilities allows unprivileged users to gain root access, potentially leading to complete system compromise. The public availability of exploit code increases the risk of active attacks, especially in environments relying on IPsec VPNs or AFS filesystems. The breach of the embargo also highlights challenges in vulnerability disclosure processes and the importance of timely patching.

Ubuntu Linux 24.04 LTS Bootable Live USB Flash Drive for PC/Laptop 64-bit
Ubuntu Linux 24.04 LTS Features: Advanced Threat Protection: Enhanced security features to detect and prevent advanced threats, including…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
Background
‘Dirty Frag’ joins a list of notable Linux kernel privilege escalation vulnerabilities, including ‘Dirty COW’ (2016) and ‘Dirty Pipe’ (2022), which exploited kernel memory handling flaws. Like these, ‘Dirty Frag’ exploits in-place modifications of page cache data through kernel crypto paths, but it uniquely chains two sub-vulnerabilities for reliable root escalation. The vulnerability affects kernels from approximately 2017 onwards, with patches currently under development and testing by major distributions.
“‘Dirty Frag’ chains two kernel sub-vulnerabilities to enable root privilege escalation on most Linux distributions since 2017.”
— Hyunwoo Kim (@v4bel)
“Mitigation efforts are underway, including kernel patches and module denylisting, but system administrators should evaluate their environment’s dependencies before applying these measures.”
— Linux security team spokesperson

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
What Remains Unclear
It remains unclear whether all affected distributions will receive timely patches or if some environments will be vulnerable due to delayed updates or unsupported kernels. The full technical details of the chaining exploit are still being analyzed by security researchers, and active exploitation in the wild has not yet been confirmed.

Zyxel USGFLEX50H Cyber Security Firewall | 2 Gbps, Up to 25 Users | Hardware Only | 5X Gigabit Ports | IPSec/SSL VPN, IPS Anti-Malware, UTM | Nebula Cloud | Fanless | TAA Compliant
MULTI-LAYERED SECURITY HARDWARE: Reputation filtering (IP/DNS/URL) and SecuReporter visibility included in Entry Defense Pack, while the optional Gold…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
What’s Next
System vendors and Linux distributions are rapidly developing and testing patches; users should monitor official channels for updates. Once patches are available, deploying them promptly and rebooting systems will be critical. Further research may reveal additional attack vectors or refinements to the exploit chain, and security teams should stay alert for active exploitation attempts.

Learn How to Use Linux, Linux Mint Cinnamon 22 Bootable 8GB USB Flash Drive – Includes Boot Repair and Install Guide Now with USB Type C
Linux Mint 22 on a Bootable 8 GB USB type C OTG phone compatible storage
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
Key Questions
What systems are affected by ‘Dirty Frag’?
The vulnerability impacts most major Linux distributions with kernels dating back to around 2017, especially those using IPsec, RxRPC, or similar kernel modules.
How can I protect my Linux system from ‘Dirty Frag’?
Apply available patches or live kernel updates as soon as they are released. In the meantime, denylist vulnerable modules like esp4, esp6, and rxrpc, but be aware this may disrupt network services relying on these modules.
Has the vulnerability been exploited in the wild?
There is currently no confirmed evidence of active exploitation, but the public availability of exploit code raises the risk of future attacks.
Will I need to reboot after applying patches?
Typically, yes. Installing patched kernels generally requires a reboot to activate the fixes.
Why was there no CVE assigned to ‘Dirty Frag’?
The vulnerability was disclosed before the official CVE assignment due to an embargo breach, which complicated coordinated disclosure efforts.