Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC

Unpatched kernel flaw chain (CVE-2026-43284, CVE-2026-43500) enables root escalation on major Linux distributions.

A newly disclosed Linux kernel local privilege escalation vulnerability chain, dubbed “Dirty Frag” and assigned CVE-2026-43284 and CVE-2026-43500, enables attackers with local access to obtain root privileges by exploiting flaws in the ESP (IPsec) and RxRPC subsystems. While no official patches are currently available, a public proof-of-concept exists. Organizations should assume the vulnerability is valid and exploitable under certain conditions. This vulnerability is a successor to Copy Fail (CVE-2026-31431), and was discovered by Hyunwoo Kim (@v4bel). "CopyFail2" is another name for the same vulnerability, and is based on an exploit reversed from the fix commit.

What is Dirty Frag?

Dirty Frag is a vulnerability chain combining two page-cache write primitives in the Linux kernel: one in the xfrm-ESP (IPsec) subsystem and another in RxRPC. Both flaws allow modification of page-cache-backed memory that is not exclusively owned by the kernel, enabling corruption of sensitive files and ultimately privilege escalation. Unlike race-condition-based exploits, this bug class is deterministic and highly reliable, similar to previous vulnerabilities like Copy Fail and Dirty Pipe.

To pull off this exploit, an attacker needs two things: access to specific vulnerable kernel interfaces and the ability to manipulate page-backed buffers (e.g., via splice()-related paths).

However, there is a significant hurdle: the exploit usually requires high-level system permissions, such as CAP_NET_ADMIN. This means exploitation is less likely in hardened containerized environments (e.g., Kubernetes with default seccomp profiles). However, the risk remains significant for virtual machines or less restricted environments. The affected code paths date back to approximately 2017 (ESP) and 2023 (RxRPC), meaning a wide range of kernel versions may be impacted.

Affected Products

The full scope is still under investigation, but the following are known or likely affected:

Product / DistributionStatus
Linux Kernel (ESP subsystem)Affected (since ~2017)
Linux Kernel (RxRPC subsystem)Affected (since ~2023)
Ubuntu (multiple versions)Affected (tested)
RHEL 8 / 9 / 10Affected
CentOS Stream 10Affected
AlmaLinux 8 / 9 / 10Affected
Fedora (recent versions)Affected
openSUSE TumbleweedAffected
OpenShift 4Potentially affected

Note: No complete version matrix is available at this time. The vulnerability was disclosed prior to embargo expiration after details became public due to reverse engineering of the fix.

What steps should security teams take?

Until official patches are released, the following mitigations are recommended:

1. Disable vulnerable kernel modules (temporary mitigation)

sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"

2. Assess operational impact before applying mitigation

  • Disabling esp4 / esp6 may break IPsec functionality

  • Disabling rxrpc may impact AFS-based environments

3. Prioritize patching when available

  • Monitor vendor advisories and apply kernel updates as soon as released

  • Some distributions (e.g., AlmaLinux testing repos) have early patched kernels available

4. Harden local access paths

  • Restrict shell access and enforce least privilege

  • Ensure SELinux/AppArmor is enforced

  • Avoid granting unnecessary capabilities (e.g., CAP_NET_ADMIN)

5. Monitor for suspicious activity

  • Detect abnormal privilege escalations

  • Track execution of compilation tools and exploit-like behavior

  • Inspect integrity of critical system binaries

6. Post-mitigation cleanup (if compromise suspected)

echo 3 > /proc/sys/vm/drop_caches

How Can Wiz Help?

Wiz customers can use the pre-built queries and advisory in the Wiz Threat Intel Center to search for relevant instances in their environment. Wiz Research will continue to update that advisory as the situation develops.

References

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

"내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다."
데이비드 에슬릭최고정보책임자(CISO)
"Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다."
아담 플레처최고 보안 책임자(CSO)
"우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다."
그렉 포니아토프스키위협 및 취약성 관리 책임자