Home / Technology / Nine-Year-Old Linux Kernel Flaw Exposes Major Distros
Nine-Year-Old Linux Kernel Flaw Exposes Major Distros
8 May
Summary
- A nine-year-old Linux kernel flaw allows root privilege escalation.
- The Dirty Frag exploit chains two page-cache write bugs.
- Mitigation breaks essential VPNs and file systems.

A significant security vulnerability, known as Dirty Frag, has been revealed, affecting major Linux distributions. This nine-year-old kernel flaw allows attackers to gain root privileges, a critical level of system access. The exploit, discovered by researcher Hyunwoo Kim, ingeniously chains two page-cache write vulnerabilities.
Initially shared under embargo, the exploit details and proof-of-concept were unfortunately leaked publicly on May 7, 2026, prior to any official patches or CVE assignment. While a severity score is pending, its nature as an unauthenticated privilege escalation flaw suggests a critical rating is likely.
Distributions confirmed to be vulnerable include Ubuntu, Red Hat Enterprise Linux, CentOS Stream, AlmaLinux, openSUSE Tumbleweed, and Fedora. These systems remain exposed as no patches are currently available. The exploit's deterministic nature, lacking race conditions, ensures a high success rate.
Temporary mitigation involves removing specific kernel modules like esp4, esp6, and rxrpc. However, this measure severely impacts network functionality by breaking IPsec VPNs and AFS distributed file systems, leaving a difficult choice between security and operational continuity until permanent fixes are ready.