DirtyFrag: A Serious Linux Local Privilege Escalation Vulnerability
TL;DR
DirtyFrag is a local privilege escalation vulnerability affecting several major Linux distributions, disclosed by Netskope. It leverages two kernel page-cache write flaws, one of which remains unpatched, highlighting potential exploitation risks.
Main Analysis
Netskope has identified DirtyFrag, a significant local privilege escalation vulnerability affecting Linux systems. Disclosed on May 7, 2026, this vulnerability utilizes two specific kernel flaws: CVE-2026-43284, which has a patch available in mainline, and CVE-2026-43500, for which there has been no patch introduced into any kernel tree. Both vulnerabilities fall under a particular category known as Dirty Pipe / Copy Fail, implying they are deterministic logic errors that can be exploited consistently and do not lead to kernel crashes on failure. The exploit’s ability to cause arbitrary command execution raises concerns about potential misuse.
The exploit mechanism involves two paths: the first requires creation privileges for namespaces, allowing an unprivileged process to overwrite a read-only file-backed memory section to spawn a root shell. Conversely, the second path doesn’t need special privileges if the rxrpc module is loaded by default, resulting in a passwordless root account and enabling the invocation of a root shell via the su command. This capability could enable attackers to gain elevated privileges without extensive groundwork.
Defensive Context
Enterprises utilizing Linux distributions such as Ubuntu, RHEL, Fedora, CentOS Stream, AlmaLinux, and openSUSE should be particularly vigilant regarding this vulnerability due to its wide-reaching implications across multiple platforms. Systems that operate with unpatched kernels may be at greater risk during this window of exposure. Specifically, those environments where the rxrpc module is loaded by default and unmitigated are highly susceptible to exploitation attempts.
Why This Matters
The reliability of the DirtyFrag exploit is concerning, as it encompasses every major Linux distribution and extends the potential for arbitrary command execution. Organizations with deployments of affected Linux systems could be at heightened risk if they do not actively monitor their kernel versions and the presence of the rxrpc module.
Defender Considerations
As there is no comprehensive patch for CVE-2026-43500, immediate interim mitigation can involve blocking kernel module loading for the implicated subsystems. This requires testing to confirm the state of relevant modules before and after applying the mitigation steps. Awareness of the existence of proof-of-concept code on public platforms suggests that defenders must remain on high alert for weaponized variants.
Indicators of Compromise (IOCs)
- CVE-2026-43284 — xfrm-ESP page-cache write (patched in mainline)
- CVE-2026-43500 — RxRPC page-cache write (no patch merged)
- YARA rules available at Netskope Threat Labs IoC repository






