<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Privilege Escalation on The Coders Blog</title><link>https://thecodersblog.com/tag/privilege-escalation/</link><description>Recent content in Privilege Escalation on The Coders Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 07 May 2026 21:08:28 +0000</lastBuildDate><atom:link href="https://thecodersblog.com/tag/privilege-escalation/index.xml" rel="self" type="application/rss+xml"/><item><title>Dirtyfrag: Universal Linux LPE Uncovered</title><link>https://thecodersblog.com/dirtyfrag-universal-linux-lpe-exploit-2026/</link><pubDate>Thu, 07 May 2026 21:08:28 +0000</pubDate><guid>https://thecodersblog.com/dirtyfrag-universal-linux-lpe-exploit-2026/</guid><description>&lt;p&gt;The Linux kernel, a bastion of open-source security, has once again demonstrated its Achilles&amp;rsquo; heel: a new universal Local Privilege Escalation (LPE) vulnerability, dubbed &amp;ldquo;Dirtyfrag,&amp;rdquo; is bypassing existing defenses and granting root access with alarming ease. This isn&amp;rsquo;t just another CVE; it&amp;rsquo;s a chilling reminder that even hardened systems remain susceptible to fundamental kernel logic flaws.&lt;/p&gt;
&lt;h3 id="the-sink-reopens-why-xfrm-esp-page-cache-write-is-a-recurring-nightmare"&gt;The &amp;ldquo;Sink&amp;rdquo; Reopens: Why &lt;code&gt;xfrm-ESP Page-Cache Write&lt;/code&gt; Is a Recurring Nightmare&lt;/h3&gt;
&lt;p&gt;Dirtyfrag isn&amp;rsquo;t an entirely novel attack vector. It builds upon the lessons learned from Dirty Pipe (CVE-2022-0847) and shares a strikingly similar exploitation &amp;ldquo;sink&amp;rdquo; with the &amp;ldquo;Copy Fail&amp;rdquo; vulnerability. The core of the exploit lies in an out-of-bounds write operation facilitated through plain network sockets, specifically via the &lt;code&gt;xfrm-ESP Page-Cache Write&lt;/code&gt; mechanism. This is the same crucial pathway that Copy Fail exploited, and critically, Dirtyfrag &lt;strong&gt;circumvents the primary mitigation&lt;/strong&gt; deployed against it: blacklisting the &lt;code&gt;algif_aead&lt;/code&gt; module.&lt;/p&gt;</description></item></channel></rss>