sábado, 9 de mayo de 2026

Linux Dirty Frag Zero-Day Grants Root Access

A critical new vulnerability class dubbed 'Dirty Frag' has been discovered in Linux systems, posing a severe security threat to all major distributions. Security researcher Hyunwoo Kim first identified and reported this exploit, which enables attackers to gain root privileges by chaining two separate vulnerabilities: the xfrm-ESP Page-Cache Write vulnerability and the RxRPC Page-Cache Write vulnerability. This discovery extends the bug class that includes the previously known Dirty Pipe and Copy Fail vulnerabilities.

Linux 'Dirty Frag' Zero-Day Grants Root Access

What makes Dirty Frag particularly dangerous is its reliability and ease of exploitation. Unlike many vulnerabilities that depend on race conditions or specific timing windows, Dirty Frag is a deterministic logic bug. This means it achieves a very high success rate without requiring precise timing, the kernel doesn't panic when exploitation attempts fail, and attackers can execute it with greater confidence. The vulnerability allows for immediate root privilege escalation across all major Linux distributions, giving malicious actors complete control over affected systems.

The security community faces an urgent situation as the embargo on this vulnerability has been broken prematurely. Currently, no official patch or CVE designation exists to address Dirty Frag, leaving countless Linux systems exposed. However, BleepingComputer has reported that the two chained vulnerabilities have now been assigned CVE identifiers: the xfrm-ESP vulnerability is tracked as CVE-2026-43284, whilst the RxRPC issue has been designated CVE-2026-43500. System administrators and security professionals should monitor their distribution's security advisories closely for forthcoming patches and apply them immediately upon release. Detailed technical information about the exploit mechanism is available for those seeking to understand the vulnerability's inner workings and potential mitigation strategies whilst official fixes are being developed.

Fuente Original: https://linux.slashdot.org/story/26/05/08/1913238/new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros?utm_source=rss1.0mainlinkanon&utm_medium=feed

Artículos relacionados de LaRebelión:

Artículo generado mediante LaRebelionBOT

No hay comentarios:

Publicar un comentario