How to Secure Your Linux System Against the Dirty Frag Exploit

By

Introduction

The recently disclosed Dirty Frag vulnerability sent shockwaves through the Linux community. This local privilege escalation (LPE) bug, tracked as CVE-2026-43500 with a CVSS score of 7.8 (HIGH), allowed a local attacker to tamper with kernel memory during decryption and gain root access. The flaw originated from a 2019 commit that mishandled certain packet types in the rxrpc subsystem. Fortunately, a proper patch has arrived in Linux 7.0.6 and 6.18.29 LTS, and major distributions have already rolled out fixes. This guide walks you through securing your system step by step.

How to Secure Your Linux System Against the Dirty Frag Exploit
Source: itsfoss.com

What You Need

Step-by-Step Instructions

Step 1: Check Your Current Kernel Version

Before updating, identify which kernel you are running. Open a terminal and execute:

uname -r

This shows the kernel version, e.g., 7.0.4-100.fc43.x86_64 or 6.18.28-.... If it ends with .29 or higher for LTS, or is 7.0.6, you're patched. Otherwise proceed.

Step 2: Update on Fedora

Fedora maintainer Justin Forbes has already pushed the fix to stable branches. Fedora 43 and 44 users receive the patched kernel in version 7.0.4 (they skipped 7.0.5). Fedora 42 gets 6.19.14-101. Run:

sudo dnf update

This lists available updates. Confirm you see kernel packages like kernel-7.0.4-100.fc43. Then upgrade:

sudo dnf upgrade

Press Y when prompted. Once complete, reboot (see Tips).

Step 3: Update on Pop!_OS

System76 has released kernel updates for Pop!_OS 22.04 and 24.04 LTS. The fix addresses both Dirty frag CVEs. For the rxrpc module, they chose to disable it rather than patch it. Run:

sudo apt update && sudo apt upgrade

After the upgrade completes, reboot with:

sudo reboot

Note that rxrpc will be disabled; if you need it, contact System76 support.

Step 4: Update on Other Distributions (Manual Kernel Installation)

If you use a distribution that hasn't received an automatic update, you can manually install Linux 7.0.6 or 6.18.29 LTS from kernel.org. Warning: This is risky – only proceed if you have backed up your data.

  1. Download the appropriate tarball from kernel.org (e.g., linux-7.0.6.tar.xz).
  2. Follow your distribution's guide for building and installing a custom kernel. For Ubuntu-based systems, we have a separate guide (linked below).
  3. After installation, reboot into the new kernel. Verify with uname -r as in Step 1.

For Ubuntu/Debian users, refer to our step-by-step manual kernel upgrade guide (internal link placeholder).

How to Secure Your Linux System Against the Dirty Frag Exploit
Source: itsfoss.com

Step 5: Verify the Patch Applied

After updating and rebooting, confirm the vulnerability is patched:

Tips for a Smooth Update

For more details on the Dirty Frag vulnerability and its discovery, see our full coverage.

Related Articles

Recommended

Discover More

Critical Linux Privilege Escalation Bug 'Copy Fail' Puts Every Distribution Since 2017 at Risk10 Key Insights Into Ireland's Historic Signing of the Artemis AccordsHow to Scale Your Cloud and AI Operations in Europe with Microsoft AzureHow to Evaluate Chery's Multi-Brand Strategy for Canadian Market EntryEnhancing Search Reliability in GitHub Enterprise Server: A High Availability Overhaul