Skip to main content
institutional access

You are connecting from
Lake Geneva Public Library,
please login or register to take advantage of your institution's Ground News Plan.

Published loading...Updated

Critical New Linux Zero-Day Goes Public—What Admins Need To Do Now

The exploit chains two kernel bugs to enable unauthenticated root access, and major Linux distributions remain unpatched, researchers said.

  • A critical Linux vulnerability named Dirty Frag was exposed after its embargo was broken, allowing immediate root privilege escalation on major distributions without an official patch or CVE identifier.
  • Researcher Hyunwoo Kim disclosed the nine-year-old flaw, which chains two kernel vulnerabilities: the ESP Page-Cache Write and the RxRPC Page-Cache Write, operating as a deterministic logic bug.
  • "Because it is a deterministic logic bug that does not depend on a timing window, no race condition is required," Kim said; the kernel does not panic when the exploit fails.
  • Current mitigation requires removing vulnerable kernel modules, but this breaks IPsec VPNs and AFS distributed network file systems, while experts anticipate a critical-severity rating of 9.0 or higher.
  • Ubuntu, Red Hat Enterprise Linux, CentOS Stream, AlmaLinux, Tumbleweed, and Fedora are confirmed vulnerable, leaving administrators exposed while awaiting official patches for this zero-day flaw.
Insights by Ground AI

23 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

phoronix.com broke the news on Friday, May 8, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal