Informational
Advisory: Linux Kernel LPE - Dirty Frag
CVE(S)
N/A
PRODUCT(S)
Cloud Optix
Sophos Endpoint
Sophos Central
Sophos Email
Sophos Firewall
Sophos Home
Sophos RED
Sophos Switch
Sophos UTM
Sophos Wireless
SophosLabs Intelix
Updated
2026 May 8
Article Version
1
First Published
2026 May 8
Publication ID
sophos-sa-20260508-dirtyfrag
Workaround
No
Overview
On 7 May 2026, a high-severity Linux kernel vulnerability class referred to as “Dirty Frag” was publicly disclosed. The issue affects networking-related components of the kernel, specifically within the xfrm-ESP and RxRPC subsystems, and arises from improper handling of page cache operations in certain data processing paths. Exploitation requires local access to the system.
The vulnerability enables a local unprivileged user to perform controlled modifications to the kernel page cache. By chaining multiple flawed code paths, an attacker can alter the in-memory representation of protected files, including setuid binaries, and achieve reliable local privilege escalation to root.
The issue originates from logic flaws introduced in different parts of the kernel over time, with affected code paths dating back to 2017. It impacts a wide range of Linux kernel versions across major distributions. At the time of disclosure, no official patches or CVE identifiers were available due to a broken coordinated disclosure process.
Are Sophos products affected?
The following products have been reviewed against Dirty Frag:
| Product or Service | Status | Description |
|---|---|---|
| Taegis | Not affected | Vulnerable code not in execute path |
| Cloud Optix | Not affected | Vulnerable code not in execute path |
| SG UTM (all versions) | Not affected | Vulnerable code not in execute path |
| Sophos Central | Not affected | Vulnerable code not in execute path |
| Sophos Endpoint Protection (Windows) | Not affected | Component not present |
| Sophos Endpoint Protection (macOS) | Not affected | Component not present |
| Sophos Endpoint Protection (Linux) | Not affected | Component not present |
| Sophos Email | Not affected | Vulnerable code not in execute path |
| Sophos Firewall (all versions) | Not affected | Vulnerable code not in execute path |
| SophosConnect Client | Not affected | Component not present |
| Sophos Home (Windows) | Not affected | Component not present |
| Sophos Home (MacOS) | Not affected | Component not present |
| SophosLabs Intelix | Not affected | Vulnerable code not in execute path |
| Sophos Mobile | Not affected | Vulnerable code not in execute path |
| Sophos Mobile EAS Proxy | Not affected | Vulnerable code not in execute path |
| Sophos Mobile Control app (iOS + Android) | Not affected | Component not present |
| Sophos Intercept X for Mobile app (iOS + Android) | Not affected | Component not present |
| Sophos Secure Email app (iOS + Android) | Not affected | Component not present |
| Sophos Secure Workspace app (iOS + Android) | Not affected | Component not present |
| Sophos Chrome Security | Not affected | Component not present |
| Sophos RED | Not affected | Vulnerable code not in execute path |
| Sophos AP/APX (SFOS Managed) | Not affected | Vulnerable code not in execute path |
| Sophos AP/APX (Central Managed) | Not affected | Vulnerable code not in execute path |
| Sophos Wireless | Not affected | Vulnerable code not in execute path |
| Sophos DNS Protection | Not affected | Vulnerable code not in execute path |
| SUSI | Not affected | Component not present |
| AV Engine (all platforms) | Not affected | Component not present |
| Taegis Log Collector | Not affected | Vulnerable code not in execute path |
| Taegis NDR | Not affected | Vulnerable code not in execute path |
Related information:
Sophos Responsible Disclosure Policy
To learn about Sophos security vulnerability disclosure policies and publications, see the Responsible Disclosure Policy.