Eksploitasi 'Dirty Frag' baru berikan akses root pada sistem Linux

Seorang peneliti keamanan telah mengungkapkan Dirty Frag, sebuah eksploitasi kernel Linux baru yang memungkinkan pengguna lokal untuk mendapatkan hak akses root. Celah ini memengaruhi distribusi-distribusi utama dan sebagian besar sistem masih belum ditambal meskipun telah ada perbaikan sebelumnya untuk masalah serupa.

Hyunwoo Kim, yang juga dikenal sebagai v4bel, melaporkan ancaman tersebut setelah mengirimkan detailnya ke milis linux-distros di bawah embargo lima hari. Pihak yang tidak disebutkan namanya merilis eksploitasi yang berfungsi pada hari yang sama, sehingga membiarkan sebagian besar distribusi terpapar. Dirty Frag menggabungkan dua celah, CVE-2026-43284 dan CVE-2026-43500, untuk memodifikasi file dalam memori tanpa mengubahnya di disk.

Artikel Terkait

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Gambar dihasilkan oleh AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Dilaporkan oleh AI Gambar dihasilkan oleh AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Four days after the CopyFail (CVE-2026-31431) exploit disclosure disrupted Ubuntu services, the US government warned of its critical risks to Linux systems, urging immediate patching amid public exploit code.

Dilaporkan oleh AI

Red Hat has provided an official link to information on the CopyFail vulnerability, known as CVE-2026-31431. The security page details a fix for the local privilege escalation issue and specifies affected versions. This follows a user inquiry urging faster publication of a patch.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Dilaporkan oleh AI

Microsoft has released an emergency patch for a high-severity vulnerability in its ASP.NET Core framework, affecting macOS and Linux applications. Tracked as CVE-2026-40372, the flaw allows unauthenticated attackers to gain SYSTEM privileges through forged authentication payloads. The company advises immediate updates and key rotation to fully mitigate risks.

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak