Critical New Linux Zero-Day Goes Public—What Admins Need To Do Now
The exploit chains two kernel bugs to enable unauthenticated root access, and major Linux distributions remain unpatched, researchers said.
- A critical Linux vulnerability named Dirty Frag was exposed after its embargo was broken, allowing immediate root privilege escalation on major distributions without an official patch or CVE identifier.
- Researcher Hyunwoo Kim disclosed the nine-year-old flaw, which chains two kernel vulnerabilities: the ESP Page-Cache Write and the RxRPC Page-Cache Write, operating as a deterministic logic bug.
- "Because it is a deterministic logic bug that does not depend on a timing window, no race condition is required," Kim said; the kernel does not panic when the exploit fails.
- Current mitigation requires removing vulnerable kernel modules, but this breaks IPsec VPNs and AFS distributed network file systems, while experts anticipate a critical-severity rating of 9.0 or higher.
- Ubuntu, Red Hat Enterprise Linux, CentOS Stream, AlmaLinux, Tumbleweed, and Fedora are confirmed vulnerable, leaving administrators exposed while awaiting official patches for this zero-day flaw.
23 Articles
23 Articles
'Dirty Frag' Linux flaw one-ups CopyFail with no patches and public root exploit
A fresh Linux privilege escalation bug dubbed "Dirty Frag" has dropped into the wild with no patches, no CVE, and a public exploit that hands attackers root access across major distributions. Security researcher Hyunwoo Kim disclosed the local privilege escalation flaw on Friday after what he said was a broken embargo forced the issue into the open. Kim described Dirty Frag as a "universal LPE" affecting "all major distributions" and warned that…
Dirty Frag Exposes Linux Kernels to Reliable Root Takeover on Major Distributions
Security researchers uncovered another serious flaw in the Linux kernel this week. It lets any local user grab root privileges on systems running distributions from Ubuntu to Red Hat. The vulnerability, called Dirty Frag, surfaced publicly on May 7, 2026, after an embargo collapsed before fixes could roll out widely. Hyunwoo Kim, the researcher behind the discovery, described it plainly. “Dirty Frag is a vulnerability (class) that achieves root …
A Simple One-Click Mitigation for ‘Copy Fail’ and ‘Dirty Frag’ for Debian, Ubuntu, Mint, and Other Debian‑Based Distros
A trusted Debian dev turns scary new kernel bugs into a temporary one‑click fix until distros ship permanent patches. The post A Simple One-Click Mitigation for ‘Copy Fail’ and ‘Dirty Frag’ for Debian, Ubuntu, Mint, and Other Debian‑Based Distros appeared first on FOSS Force.
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium









