After the copy-fail vulnerability, another new vulnerability was found recently. This allows a regular user to become root without the password (which means, any random program can successfully run a root command).
"This vulnerability has a similar impact to the previous Copy Fail.
Because the embargo has now been broken, no patches or CVEs exist for
these vulnerabilities. After consultation with the linux-distros@ā¦openwall.org
maintainers, and at the maintainersā request, I am publicly releasing this
Dirty Frag document.
As with the previous Copy Fail vulnerability, Dirty Frag likewise allows
immediate root privilege escalation on all major distributions, and it
chains two separate vulnerabilities"
WTH does āthe embargo has now been brokenā mean? a chain of custody thing?
In light of the Global Canvas .edu ransomware fiasco where ShinyObjects or whatever its called claims 275 million PII-breached students, teachers, and admins around the world and has literally stopped all online learning around the world at most colleges and unisā¦
..in light of copy/failā¦
..in light of massive DDOS on arch/UBU
ā¦thereās more Iām missing including āIranianā hacks etc
Digitally, May really feels like (cyber) war for some reasonā¦and it just startedā¦
This is the mitigation being shared by most sources:
Mitigation
Because the responsible disclosure schedule and the embargo have been broken, no patch exists for any distribution. Use the following command to remove the modules in which the vulnerabilities occur.
Just hold on a minute. This will disable IPSec for IPv4 and IPv6. How will VPNs work after this?
Embargo period is typically 60-90 days when the exploit is first disclosed to the original developers and they have time to fix this. So there has been no fix for this til now? Are you sh****ng me?
Yeah VPNās using IPsec will have an issue. There are other protocols, but sometimes one is at the mercy of corporate IT departments. If those departments are using Linux, I imagine this would get their attention at least.
will clean off caches affected in case but no warranty on that.
Seems this vulnerability was leaked before anyone was able to create any real fix to close it:
Kim submitted the rxrpc patch to the netdev mailing list on April 29, 2026. The linux-distros embargo was set for May 12. An unrelated third party published the ESP exploit publicly on May 7, breaking the embargo and triggering immediate full disclosure
And i do not recommend to run the one-line-special mentioned, it is not to test if you are effected, it is to demonstrate the vulnerability itself:
6.18.28-1: current latest build which includes the upstream fixes plus some final fixes .. only tried to report its still ongoing and could change i think.
6.18.27-1 was the version first submitted but only partly fixing the issue.
Is this a typo, i.e. did you mean to say to run this command? If not, could you elaborate why not to run this command? (Or maybe I missed that part in the linked write-ups?)