1209551
📖 Tutorial

Dirty Frag Exploit Fully Patched in Linux 7.0.6: Everything You Need to Know

Last updated: 2026-05-15 00:42:48 Intermediate
Complete guide
Follow along with this comprehensive guide

The recent disclosure of the Dirty Frag local privilege escalation (LPE) vulnerability sent shockwaves through the Linux ecosystem. With a patch now available in Linux 7.0.6 and the 6.18.29 LTS kernel, users and admins are eager to understand the threat and how to protect their systems. This Q&A breaks down the exploit, the fix, and the steps to update your distribution.

What is the Dirty Frag exploit, and why was it considered urgent?

Dirty Frag is a local privilege escalation vulnerability that was inadvertently exposed to the public before a patch was ready, catching the Linux kernel team and distributions off guard. The exploit allows a local attacker with user-level access to gain root privileges by tampering with kernel memory during decryption operations. Its urgency stems from the ease of exploitation and the wide impact across Linux systems, making immediate patching critical for security.

Dirty Frag Exploit Fully Patched in Linux 7.0.6: Everything You Need to Know
Source: itsfoss.com

What CVE and CVSS score are associated with this vulnerability?

The vulnerability is tracked as CVE-2026-43500 and carries a CVSS score of 7.8 (HIGH) on the National Vulnerability Database. This rating reflects the relatively low complexity of the attack and the serious impact of privilege escalation. The vulnerability was discovered and disclosed by researcher Hyunwoo Kim, who also authored the official patch that addresses the flaw.

What was the root cause of the Dirty Frag vulnerability in the Linux kernel?

The root cause traces back to a 2019 kernel commit that introduced two packet types in the rxrpc (RxRPC) handling path that were not properly accounted for as shared memory. Specifically, packets fed through splice() and those with fragment chains attached were not treated as shared. The kernel skipped making a safe copy before decryption, decrypting them in place. This left a window for a local attacker to modify those pages from userspace while decryption was happening, ultimately enabling root access.

How does the official patch fix the Dirty Frag exploit?

The patch, merged by Linus Torvalds on May 10, extends the existing check in two rxrpc functions to also catch the two previously missed packet types. Now, when these packet types are encountered, the kernel properly copies them to a private buffer before performing decryption, closing the race condition that allowed userspace tampering. The fix ensures that all shared-memory cases are handled securely, restoring the intended behavior that should have been in place since the 2019 commit.

When was the patch released, and which kernel versions include it?

Linus Torvalds merged the patch on May 10, and Linux 7.0.6 was officially released the following day, May 11. The fix also landed in the long-term support kernel 6.18.29 LTS. Distributions like Fedora and Pop!_OS released their own patched kernels even before the official 7.0.6 tarball was available, prioritizing rapid deployment.

Dirty Frag Exploit Fully Patched in Linux 7.0.6: Everything You Need to Know
Source: itsfoss.com

How can users manually update their Linux kernel to get the fix?

For those comfortable with manual installation, the tarball for Linux 7.0.6 can be downloaded from kernel.org. This method is recommended only for experienced users who have backed up their data, as installing a kernel manually carries risks. If you're on an Ubuntu-based distribution, a detailed guide is available to walk you through the process. Always ensure you have a backup before proceeding.

What about Fedora and Pop!_OS users? How do they get the patched kernel?

Both distributions pushed fixes ahead of the official 7.0.6 release. For Fedora, maintainer Justin Forbes announced that the patch was included in kernel 7.0.4 for Fedora 43 and 44, and 6.19.14-101 for Fedora 42. To update, run sudo dnf update followed by sudo dnf upgrade and confirm the upgrade. For Pop!_OS, System76 released kernel updates for the LTS releases 22.04 and 24.04. The esp4 and esp6 modules were patched and are safe to re-enable, while the rxrpc module was disabled rather than patched. Update with sudo apt update && sudo apt upgrade and reboot with sudo reboot.

What precautions should users take before updating?

Before applying any kernel update—especially a manual one—it is essential to back up your data. Kernel updates can sometimes cause system instability or incompatibility with hardware drivers. For distribution-provided updates, the risk is lower, but rebooting promptly after the update is crucial to ensure the patched kernel is active. Always verify that the update includes the Dirty Frag fix by checking the kernel version number (e.g., 7.0.6 or later).