A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux ...
The actively exploited flaw builds on Dirty Pipe and Copy Fail techniques to overwrite page cache and gain full system ...
Two new high-severity vulnerabilities, dubbed ’Dirty Frag’ when chained, have been found in the Linux kernel, affecting most ...
A researcher shared their findings with Linux distro maintainers, but leaked before a patch was built.
A newly disclosed vulnerability in a Linux program can be exploited for local privilege escalation — and ultimately to acquire root privileges, researchers at cybersecurity vendor Qualys said today.
A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud ...
A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the kernel. To go along with the “Dirty Pipe” Linux security bug coming to light, two researchers ...
The privilege escalation vulnerability, which is similar to other Linux flaws like Copy Fail and Dirty Pipe, may already be ...
The issue impacts many large distros with GUI interfaces. A local privilege-escalation and file-overwrite vulnerability in X.Org X server opens the door to trivial compromise in Linux systems that use ...
The Linux kernel team has released a patch to fix a security bug that could allow an attacker to execute code with elevated privileges. The issue — tracked as CVE-2017-15265 — is a use-after-free ...
A set of newly identified vulnerabilities in the Linux security module AppArmor could allow attackers to gain root access, bypass system protections and trigger service outages across millions of ...
Researchers found an easy-to-exploit vulnerability in Snap, a universal application packaging and distribution system developed for Ubuntu but available on multiple Linux distributions. The flaw ...