[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fiB5iiD-dWzCfenrG293sRUK48916GlRvJf4eCnsGGVw":3},{"article":4,"iocs":33},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":23,"category":24,"article_tags":27},"1482029f-3a36-4c47-a648-4fa024045e2d","Dirty Frag is a Linux LPE case worth watching closely\n\nIt chains two page-cache write issues to g...","dirty-frag-is-a-linux-lpe-case-worth-watching-closely-it-chains-two-page-cache-w-c9a24b","Dirty Frag is a Linux LPE case worth watching closely\n\nIt chains two page-cache write issues to gain root on major Linux distributions, and the current situation is messy:\n\n- high impact local privilege escalation\n- public PoC available\n- one part patched in mainline\n- another https:\u002F\u002Ft.co\u002F1h0BT8Z6HK","Dirty Frag is a high-impact local privilege escalation vulnerability affecting Linux that chains two page-cache write issues to gain root access on major distributions. A public proof-of-concept is available, with one vulnerability partially patched in the mainline kernel while patches for the full attack chain remain incomplete across distributions. This creates an active exploitation window on unpatched systems.","Dirty Frag Linux LPE chains two page-cache write bugs for root access on major distros",null,"https:\u002F\u002Fx.com\u002Fnextronresearch\u002Fstatus\u002F2052771584180359222","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHHzo0ArW4Ac-dbn.jpg","2026-05-08T15:24:18+00:00","2026-05-08T16:00:13.583867+00:00",9,[18,21],{"name":19,"type":20},"Linux","technology",{"name":22,"type":20},"Page cache","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":23,"icon":11,"name":25,"slug":26},"Vulnerabilities","vulnerabilities",[28],{"category":29},{"id":30,"icon":11,"name":31,"slug":32},"574f766a-fb3f-487c-8d2c-0720ae75471b","Zero-day","zero-day",[]]