{"id":236798,"date":"2026-05-08T22:25:52","date_gmt":"2026-05-09T03:25:52","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2026\/05\/new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros"},"modified":"2026-05-08T22:25:52","modified_gmt":"2026-05-09T03:25:52","slug":"new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2026\/05\/new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros","title":{"rendered":"New Linux \u2018Dirty Frag\u2019 zero-day gives root on all major distros"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros.jpg\"><\/a><\/p>\n<p>A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command.<\/p>\n<p>Security researcher Hyunwoo Kim, who <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2026\/05\/07\/8\" target=\"_blank\" rel=\"nofollow noopener\">disclosed<\/a> it earlier today and published a proof-of-concept (PoC) exploit, <a href=\"https:\/\/twitter.com\/v4bel\/status\/2052464007857185136\" target=\"_blank\" rel=\"nofollow noopener\">says<\/a> this local privilege escalation was introduced roughly nine years ago in the Linux kernel\u2019s algif_aead cryptographic algorithm interface.<\/p>\n<p><a href=\"https:\/\/github.com\/V4bel\/dirtyfrag\" target=\"_blank\" rel=\"nofollow noopener\">Dirty Frag<\/a> works by chaining two separate kernel flaws, the xfrm-ESP Page-Cache Write vulnerability and the RxRPC Page-Cache Write vulnerability, to modify protected system files in memory without authorization and achieve privilege escalation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command. Security researcher Hyunwoo Kim, who disclosed it earlier today and published a proof-of-concept (PoC) exploit, says this local privilege escalation was introduced roughly nine years ago in the Linux kernel\u2019s algif_aead [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,41,1492],"tags":[],"class_list":["post-236798","post","type-post","status-publish","format-standard","hentry","category-computing","category-information-science","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/236798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=236798"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/236798\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=236798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=236798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=236798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}