Have you run your Linux distribution updates recently? You probably should, because Dirty Frag and Copy Fail are coming for you. Two major Local Privilege Escalation (LPE) security issues have been revealed in a short time, which is not ideal.
For Copy Fail that was revealed at the end of April the website notes it simply enough for you "An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root" - pretty bad. There's thankfully some patches rolling out across different distributions for it.
And now we also have Dirty Frag, which has been fully revealed early due to an embargo being broken and so Linux distribution developers will need to scramble to get patches ready for it. The impact is very similar to Copy Fail, enabling an attacker to gain root access to your system to do whatever they feel like.
However, a quick workaround (taken from the Dirty Frag disclosure) can be done as noted to protected yourself via terminal:
sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; echo 3 > /proc/sys/vm/drop_caches; true"
This is a special case, because no current patches exist. It should be fine to run on any distribution.
Keep a close eye on updates coming in over the next week, you're going to need them.
They're being blown up out of proportion, if you ask me. And I'm not happy at all about the tools used to find them or the methods to reveal them before a patch could be written and distributed.
Quoting: MakiNote that both vulnerabilities are for a local user to gain root access.Isn't that what privilege escalation is all about?
You got to local user, then you enhance your rights and become root.
I mean, it's not like "local user" means someone has to sit at your keyboard...
Last edited by Eike on 8 May 2026 at 9:34 am UTC
Quoting: EikeNo, but someone still needs to have a local user account. So this is a big problem for multi-user systems. But I imagine most of us operate their home machine for themselves only, so for most of "us" it's not immediately exploitable.Quoting: MakiNote that both vulnerabilities are for a local user to gain root access.Isn't that what privilege escalation is all about?
You got to local user, then you enhance your rights and become root.
I mean, it's not like "local user" means someone has to sit at your keyboard...




How to setup OpenMW for modern Morrowind on Linux / SteamOS and Steam Deck
How to install Hollow Knight: Silksong mods on Linux, SteamOS and Steam Deck