Nova vulnerabilidade 'Dirty Frag' concede acesso root a sistemas Linux

Um pesquisador de segurança revelou o Dirty Frag, uma nova vulnerabilidade no kernel do Linux que permite a usuários locais obter privilégios de root. A falha afeta as principais distribuições e permanece sem correção na maioria dos sistemas, apesar de correções anteriores para um problema semelhante.

Hyunwoo Kim, também conhecido como v4bel, relatou a ameaça após enviar detalhes para a lista de discussão linux-distros sob um embargo de cinco dias. Uma parte não identificada divulgou um exploit funcional no mesmo dia, deixando a maioria das distribuições exposta. O Dirty Frag combina duas falhas, CVE-2026-43284 e CVE-2026-43500, para modificar arquivos na memória sem alterá-los no disco.

Artigos relacionados

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Imagem gerada por IA

Linux CopyFail exploit threatens root access amid Ubuntu outage

Reportado por IA Imagem gerada por IA

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Four days after the CopyFail (CVE-2026-31431) exploit disclosure disrupted Ubuntu services, the US government warned of its critical risks to Linux systems, urging immediate patching amid public exploit code.

Reportado por IA

Red Hat has provided an official link to information on the CopyFail vulnerability, known as CVE-2026-31431. The security page details a fix for the local privilege escalation issue and specifies affected versions. This follows a user inquiry urging faster publication of a patch.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Reportado por IA

Microsoft has released an emergency patch for a high-severity vulnerability in its ASP.NET Core framework, affecting macOS and Linux applications. Tracked as CVE-2026-40372, the flaw allows unauthenticated attackers to gain SYSTEM privileges through forged authentication payloads. The company advises immediate updates and key rotation to fully mitigate risks.

sexta-feira, 06 de março de 2026, 04:23h

Linux rootkits advance with eBPF and io_uring techniques

quinta-feira, 19 de fevereiro de 2026, 13:36h

Researchers uncover new SysUpdate malware variant targeting Linux

quarta-feira, 18 de fevereiro de 2026, 23:37h

New SysUpdate malware variant targets Linux systems

quarta-feira, 18 de fevereiro de 2026, 11:16h

Dell zero-day flaw unpatched for nearly two years

quarta-feira, 11 de fevereiro de 2026, 00:43h

Researchers discover SSHStalker botnet infecting Linux servers

Este site usa cookies

Usamos cookies para análise para melhorar nosso site. Leia nossa política de privacidade para mais informações.
Recusar