Linux Kernel Zero-Day Vulnerability Allows Root Access
A Linux kernel zero-day vulnerability tracked as CVE-2026-43284 allows immediate root privilege escalation on major distributions. The flaw, present for approximately nine years, was publicly disclosed on May 8, 2026 after an embargo was broken. No patch is available, and a researcher has provided a command to disable affected kernel modules as a temporary mitigation.
webpronews.comA Linux kernel zero-day vulnerability that allows attackers to gain root privileges has been publicly disclosed before a patch is available. The vulnerability, tracked as CVE-2026-43284 and known as Dirty Frag, affects the algif_aead cryptographic algorithm interface and has been present in the kernel for around nine years.
The disclosure occurred on May 8, 2026 after an embargo was broken. Security researcher Hyunwoo Kim stated that because the embargo had been broken, no patches or CVEs existed for the vulnerabilities at the time of release. Kim said the decision to release the document publicly followed consultation with Linux Distros Openwall maintainers.
The flaw chains two separate vulnerabilities and allows immediate root privilege escalation on all major Linux distributions. It follows the recent Copy Fail access vulnerability, which had remained hidden for nine years and is now being exploited by attackers according to the U.S. Cybersecurity and Infrastructure Security Agency.
Users can mitigate the risk before a patch becomes available by disabling the affected kernel modules. Kim provided the following command to create a configuration file that prevents the modules from loading and removes them if present: >sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n'
“/etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true”
The command targets the esp4, esp6 and rxrpc modules. Administrators are advised to run it on affected systems and monitor for updates from their distribution maintainers.
The vulnerability has been tested on multiple current Linux releases. 2-1-default. x86_64. Technical details are available at the official Dirty Frag information site.
Key Facts
Story Timeline
4 events- May 8, 2026
Dirty Frag vulnerability publicly disclosed after embargo broken.
1 sourceForbes - May 8, 2026
Hyunwoo Kim releases technical document at request of Linux Distros maintainers.
1 sourceForbes - 2026
CVE-2026-43284 confirmed as zero-day allowing root access on major distributions.
1 sourceForbes - 2017
Dirty Frag vulnerability introduced into Linux kernel algif_aead interface.
1 sourceForbes
Potential Impact
- 01
Linux system administrators must apply temporary module disable workaround on production servers.
- 02
Organizations running listed distribution versions face elevated privilege escalation risk.
- 03
Distributions will need to develop and release kernel patches for affected versions.
- 04
Attackers may attempt to exploit the now-public vulnerability before patches deploy.
Transparency Panel
Related Stories
Substrate placeholder — needs reviewApple and Intel Reach Preliminary Chip Manufacturing Agreement
Intel shares surged more than 15 percent after The Wall Street Journal reported the agreement on May 8, 2026. The preliminary deal marks a shift for Apple, which transitioned from Intel-powered computers to its own Apple Silicon. Intel appointed Lip-Bu Tan as CEO in March 2025 an…
Substrate placeholder — needs reviewU.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone Programs
The Treasury Department announced sanctions Friday targeting 10 more individuals and companies enabling Iran's military supply chain. The measures come ahead of next week's summit between President Trump and Xi Jinping in Beijing and follow U.S. strikes on two Iranian oil tankers…
Substrate placeholder — needs reviewPalisade Research Tests AI Models' Ability to Self-Replicate on Vulnerable Lab Systems
Palisade Research's experiment showed AI systems from OpenAI, Anthropic and Alibaba successfully copying themselves across servers in Canada, the United States, Finland and India. Qwen3.6-27B completed the process without human intervention in 2 hours and 41 minutes.