Skip to Content
Informational

Informational

Advisory: Linux Kernel LPE - Dirty Frag

CVE(S)

N/A

PRODUCT(S)

Cloud Optix

Sophos Endpoint

Sophos Central

Sophos Email

Sophos Firewall

Sophos Home

Sophos RED

Sophos Switch

Sophos UTM

Sophos Wireless

SophosLabs Intelix

Updated

2026 May 8

Article Version

1

First Published

2026 May 8

Publication ID

sophos-sa-20260508-dirtyfrag

Workaround

No

Overview

On 7 May 2026, a high-severity Linux kernel vulnerability class referred to as “Dirty Frag” was publicly disclosed. The issue affects networking-related components of the kernel, specifically within the xfrm-ESP and RxRPC subsystems, and arises from improper handling of page cache operations in certain data processing paths. Exploitation requires local access to the system.

The vulnerability enables a local unprivileged user to perform controlled modifications to the kernel page cache. By chaining multiple flawed code paths, an attacker can alter the in-memory representation of protected files, including setuid binaries, and achieve reliable local privilege escalation to root.

The issue originates from logic flaws introduced in different parts of the kernel over time, with affected code paths dating back to 2017. It impacts a wide range of Linux kernel versions across major distributions. At the time of disclosure, no official patches or CVE identifiers were available due to a broken coordinated disclosure process.

Are Sophos products affected?

The following products have been reviewed against Dirty Frag:

Product or ServiceStatusDescription
TaegisNot affectedVulnerable code not in execute path
Cloud OptixNot affectedVulnerable code not in execute path
SG UTM (all versions)Not affectedVulnerable code not in execute path
Sophos CentralNot affectedVulnerable code not in execute path
Sophos Endpoint Protection (Windows)Not affectedComponent not present
Sophos Endpoint Protection (macOS)Not affectedComponent not present
Sophos Endpoint Protection (Linux)Not affectedComponent not present
Sophos EmailNot affectedVulnerable code not in execute path
Sophos Firewall (all versions)Not affectedVulnerable code not in execute path
SophosConnect ClientNot affectedComponent not present
Sophos Home (Windows)Not affectedComponent not present
Sophos Home (MacOS)Not affectedComponent not present
SophosLabs IntelixNot affectedVulnerable code not in execute path
Sophos MobileNot affectedVulnerable code not in execute path
Sophos Mobile EAS ProxyNot affectedVulnerable code not in execute path
Sophos Mobile Control app (iOS + Android)Not affectedComponent not present
Sophos Intercept X for Mobile app (iOS + Android)Not affectedComponent not present
Sophos Secure Email app (iOS + Android)Not affectedComponent not present
Sophos Secure Workspace app (iOS + Android)Not affectedComponent not present
Sophos Chrome SecurityNot affectedComponent not present
Sophos REDNot affectedVulnerable code not in execute path
Sophos AP/APX (SFOS Managed)Not affectedVulnerable code not in execute path
Sophos AP/APX (Central Managed)Not affectedVulnerable code not in execute path
Sophos WirelessNot affectedVulnerable code not in execute path
Sophos DNS ProtectionNot affectedVulnerable code not in execute path
SUSINot affectedComponent not present
AV Engine (all platforms)Not affectedComponent not present
Taegis Log CollectorNot affectedVulnerable code not in execute path
Taegis NDRNot affectedVulnerable code not in execute path

Related information:

Sophos Logo

Sophos Responsible Disclosure Policy

To learn about Sophos security vulnerability disclosure policies and publications, see the Responsible Disclosure Policy.