Dirty Frag CVE-2026-43284 Exploited in Wild, Linux Patches Out

Microsoft Defender confirmed limited in-the-wild exploitation of Dirty Frag CVE-2026-43284 in Linux, a deterministic LPE chain targeting xfrm-ESP and RxRPC page caches. Patches available for major distributions.
Table of Contents
    Add a header to begin generating the table of contents

    Microsoft Defender confirmed limited in-the-wild exploitation of the Linux “Dirty Frag” vulnerability chain on May 11, 2026, with attackers observed modifying GLPI LDAP authentication files and accessing PHP session data on compromised systems — establishing that CVE-2026-43284 has been weaponized in active attacks just days after its public disclosure.

    Dirty Frag: A Deterministic Linux Local Privilege Escalation Chain With No Race Condition

    Researcher Hyunwoo Kim publicly disclosed the Dirty Frag vulnerability chain combining two page-cache write primitives in separate Linux kernel subsystems: CVE-2026-43284 in the xfrm-ESP (IPsec) processing code and CVE-2026-43500 in the RxRPC subsystem. An unprivileged local user exploiting the chain can escalate to root by corrupting arbitrary page caches and pivoting through kernel memory manipulation without triggering any race condition.

    Kim specifically noted that the exploit is deterministic and “no race condition is required,” with a “very high” success rate — a technically significant characteristic that distinguishes Dirty Frag from many prior Linux local privilege escalation vulnerabilities that relied on timing-dependent race conditions. Race-condition-dependent exploits are inherently less reliable in practice, requiring multiple attempts that generate noise in system logs and may trigger anomaly detection. A deterministic exploit succeeds on a single, clean attempt.

    In container environments, Kim assessed that container escape may also be achievable through the same privilege escalation chain under certain configurations — extending the impact beyond standalone Linux system compromise to containerized workloads that rely on kernel-level privilege separation.

    Observed Exploitation: GLPI LDAP Files and PHP Session Data Targeted

    Microsoft Defender’s confirmation of in-the-wild activity on May 11 identified specific attack patterns: modification of GLPI LDAP authentication configuration files and access to PHP session files on compromised systems. GLPI is a widely deployed open-source IT asset management and service desk platform used across enterprise and government environments. Modification of its LDAP authentication configuration would allow an attacker to redirect authentication queries to an attacker-controlled LDAP server, enabling credential capture from all users authenticating through the modified configuration.

    The combination of LPE exploitation followed by authentication infrastructure modification suggests attackers are using Dirty Frag to establish privileged persistence within systems where they previously had limited access, then modifying authentication systems to capture credentials for broader lateral movement.

    Dirty Frag and Copy Fail: Parallel Page-Cache LPE Research Targets the Same Kernel Primitive

    Dirty Frag is the direct successor to Copy Fail (CVE-2026-31431), which was disclosed May 1, 2026 and exploited the same class of page-cache write primitive in the algif_aead cryptographic interface. Both vulnerabilities were discovered by Hyunwoo Kim as part of systematic research into page-cache write primitives across the Linux kernel. Copy Fail targeted the algif_aead cryptographic interface; Dirty Frag targets the xfrm-ESP IPsec subsystem (CVE-2026-43284) and the RxRPC transport (CVE-2026-43500).

    The two vulnerabilities use the same underlying technique in different kernel subsystems, meaning patching Copy Fail does not address Dirty Frag and patching Dirty Frag does not address Copy Fail. Security teams should treat these as two separate patch requirements and verify patch status independently for each CVE.

    Patch Availability and Remediation Status for Major Linux Distributions

    CVE-2026-43284 is patched in the mainline Linux kernel and in distribution packages from Red Hat, Canonical (Ubuntu), Amazon Linux, Fedora, and AlmaLinux. CVE-2026-43500 patches were still being finalized as of May 11 — meaning systems may remain partially exposed until the RxRPC fix completes the distribution cycle.

    Qualys and Wiz have both published technical analyses of the Dirty Frag exploitation mechanism. Red Hat issued Security Bulletin RHSB-2026-003 documenting the vulnerability and remediation status across RHEL and related distributions.

    The public availability of a working exploit for CVE-2026-43284 before CVE-2026-43500 patches were available for all distributions created an exploitation window for the second half of the chain — staged multi-CVE disclosures carry this risk whenever patches for all components are not ready simultaneously.

    Related Posts