Overview Recently, NSFOCUS CERT has detected a Linux kernel privilege escalation vulnerability (Dirty Frag) disclosed online. Attackers use the logical defects of splice system calls in conjunction ...
Linux admins reeling from handling last month’s CopyFail and last week’s Dirty Frag kernel vulnerabilities have a new ...
Dirty Frag exposes Linux systems to root escalation through chained kernel flaws, impacting Ubuntu, RHEL, Fedora, and others.
The privilege escalation vulnerability, which is similar to other Linux flaws like Copy Fail and Dirty Pipe, may already be ...
CISA warns that the nine-year-old Linux Copy Fail flaw is being actively exploited, allowing local attackers to gain root ...
A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud ...
CVE-2026-31431 exploited in Linux since 2017, enabling root access via simple PoC, increasing container and cloud risks.
The flaw allows an unprivileged local user to write four controlled bytes into the page cache of any readable file on a Linux system, which can then be leveraged to obtain root privileges. Successful ...
Security researchers have discovered a new, critical flaw in the Linux kernel that attackers can exploit to gain root access.
A logic flaw sitting undetected in the Linux kernel for nearly nine years lets any unprivileged local user gain root access ...
Dirty Frag is a new Linux kernel vulnerability that hands attackers root on every major distro. We break down what's affected ...
The discoverers have named the root vulnerability "Copy Fail". All major distributions since 2017 are affected.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results