New dirty frag exploit grants root access on linux systems

A security researcher has disclosed Dirty Frag, a new Linux kernel exploit that allows local users to gain root privileges. The flaw affects major distributions and remains unpatched on most systems despite earlier fixes for a similar issue.

Hyunwoo Kim, also known as v4bel, reported the threat after submitting details to the linux-distros mailing list under a five-day embargo. An unnamed party released a working exploit the same day, leaving most distributions exposed. Dirty Frag combines two flaws, CVE-2026-43284 and CVE-2026-43500, to modify files in memory without altering them on disk.

Verwandte Artikel

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Bild generiert von KI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Von KI berichtet Bild generiert von KI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Four days after the CopyFail (CVE-2026-31431) exploit disclosure disrupted Ubuntu services, the US government warned of its critical risks to Linux systems, urging immediate patching amid public exploit code.

Von KI berichtet

Red Hat has provided an official link to information on the CopyFail vulnerability, known as CVE-2026-31431. The security page details a fix for the local privilege escalation issue and specifies affected versions. This follows a user inquiry urging faster publication of a patch.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Von KI berichtet

Microsoft has released an emergency patch for a high-severity vulnerability in its ASP.NET Core framework, affecting macOS and Linux applications. Tracked as CVE-2026-40372, the flaw allows unauthenticated attackers to gain SYSTEM privileges through forged authentication payloads. The company advises immediate updates and key rotation to fully mitigate risks.

Freitag, 06. März 2026, 04:23 Uhr

Linux rootkits advance with eBPF and io_uring techniques

Donnerstag, 19. Februar 2026, 13:36 Uhr

Researchers uncover new SysUpdate malware variant targeting Linux

Mittwoch, 18. Februar 2026, 23:37 Uhr

New SysUpdate malware variant targets Linux systems

Mittwoch, 18. Februar 2026, 11:16 Uhr

Dell zero-day flaw unpatched for nearly two years

Mittwoch, 11. Februar 2026, 00:43 Uhr

Researchers discover SSHStalker botnet infecting Linux servers

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen