This release is an emergency release to fix a critical security vulnerabilityin the Linux kernel, a
This story is only covered by news sources that have yet to be evaluated by the independent media monitoring agencies we use to assess the quality and reliability of news outlets on our platform. Learn more here.
Dirty Frag has once again revealed a critical security vulnerability for Linux systems, through which attackers can extend their user rights to root rights. The attack method is based on a combination of several kernel errors. The so-called page cache is manipulated in memory, so that even files with read rights only appear changed. Sensitive system files such as /etc/passwd or programs are affected.