Security researchers have discovered a new, critical flaw in the Linux kernel that attackers can exploit to gain root access.
Dirty Frag exposes Linux systems to root escalation through chained kernel flaws, impacting Ubuntu, RHEL, Fedora, and others.
It takes 732 bytes. That is roughly the length of this paragraph, and it is all an attacker needs to seize full root control ...
A fresh Linux privilege escalation bug dubbed "Dirty Frag" has dropped into the wild with no patches, no CVE, and a public ...
Federal agencies running Linux have until May 15, 2026, to patch a kernel vulnerability that lets attackers seize root access ...
Hot on the heels of Copy Fail comes Dirty Frag. A Linux kernel zero-day vulnerability with no patch, giving hackers root.
Further vulnerabilities named “Dirty Frag” enable privilege escalation. All distributions are reportedly affected.
CVE-2026-31431 CVSS 7.8 flaw since 2017 enables root via 732-byte exploit, impacting major Linux distributions.
CVE-2026-31431, also known as Copy Fail, is a critical Linux kernel vulnerability that's been hiding out since 2017 and is ...
Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of ...
Microsoft has warned about a serious Linux kernel vulnerability that could allow attackers to gain full control of affected ...
CISA warns that the nine-year-old Linux Copy Fail flaw is being actively exploited, allowing local attackers to gain root ...