CVE ID: Pending (2026 Disclosure)
Severity: Critical
Overview:
Dirty Frag is a high-reliability exploit targeting the Linux kernel's networking subsystems (xfrm and rxrpc). It allows an attacker to gain root privileges deterministically. This is especially dangerous for shared hosting environments as it does not require special permissions to execute.
Affected Systems:
- Most Linux distributions using kernels 4.14 through 6.x/7.x.
Immediate Mitigation One-Liner (AlmaLinux/RHEL):
Bash
sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf && rmmod esp4 esp6 rxrpc 2>/dev/null; sync; echo 3 > /proc/sys/vm/drop_caches"
Immediate Mitigation One-Liner (Ubuntu/Debian):
Bash
sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf && rmmod esp4 esp6 rxrpc 2>/dev/null; update-initramfs -u; sync; echo 3 > /proc/sys/vm/drop_caches"