frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

"Dirty Frag" (CVE-2026-43284): The Second Linux Root Exploit in Eight Days

https://www.copahost.com/blog/dirty-frag-cve-2026-43284/
29•ggallas•2h ago

Comments

tuwtuwtuwtuw•1h ago
> the attacker does not need to break in remotely. The danger is that once an attacker gets in — through a vulnerable WordPress plugin, a web shell, weak SSH credentials, or a compromised container

This part I don't understand. Wouldn't the attacker need to break in remotely? Ö

serious_angel•1h ago
This does sound inadequate. Do you think it's a possible AI slop "logic" written, too?
dunder_cat•49m ago
Your understanding is fine. In many environments, you can still do a lot of damage just by popping a shell and being able to access the database/sensitive environment variables/sensitive code. Getting to root would just be the icing on the cake.

That being said, it's pretty common for non-containerized processes to drop permissions to a low-privileged service account (like nginx running as `nobody`), so it definitely thwarts defense-in-depth in those setups.

In containerized environments, my understanding is their use of namespaces means you still need something more clever than just "patch out the authentication logic in su via the page cache" to escalate permissions in the system to break out of the container. That doesn't mean it's impossible in these exploits (the original copyfail writeup alluded to a second writeup coming to this effect - distinct from dirtyfrag though), but it does mean you're not going to be able to just spam the PoCs floating around.

dunder_cat•44m ago
Also, meant to share some interesting readings. In the Kubernetes world, my RSS feed lit up with their blog post about user namespaces being generally available in k8s 1.36.

They actually provided some example CVEs that wouldn't have been possible if in addition to containers, they were also using user namespaces https://github.com/kubernetes/enhancements/tree/217d790720c5.... The first example talks about "CVE-2019-5736: Host runc binary can be overwritten from container. Completely mitigated with userns." So it seems like getting root in a regular container gives you more of an attack surface, but if user namespaces are deployed, then it's even harder to do anything useful with it. I am looking forward to the aforementioned writeups since user namespace escapes usually mean another kernel bug.

guiambros•17m ago
The answer is in your question:

"...through a vulnerable WordPress plugin, a web shell, weak SSH credentials, or a compromised container"

DirtyFrag alone doesn't help an attacker; they need to get in first. But the blast radius is much wider now. A wordpress flaw, or a prompt injection in your OpenClaw skills, or a supply chain compromise in npm librarires means they now have full root access to your system.

serious_angel•1h ago
Nothing surprising there, even if 50 issues will be found in a month, since there exists more advanced relativity-based automation features as LLM.

It's easier to attack a solution with its source code available, and with an LLM trained on existing vulnerabilities found, and some datacenters/funding available, et voila, you have a system set to reveal flaws in already awesome projects, to be fixed.

This is normal. You just need power, and time. And there must be more found but left undisclosed, for better times, strategic 0days etc.

Who has such power, and funding? Is it possible Linux competitors do pay enthusiasts to attack, reveal, and damage reputation? What if someone who has funding and time, would try attacking their closed source code instead? Regardless, I wish them safety and peace, too.

dylan604•56m ago
Are you suggesting somehow Microsoft or Apple would be doing this? That seems pretty perverted if you are.

If I were Redhat or any other distro maintainers, this seems like something I'd want to be doing internally to lock it down.

pbowyer•57m ago
Previously covered at https://news.ycombinator.com/item?id=48053623
stefan_•36m ago
Slop blogspam summary. Even before everyone lost their mind to Mythos and other IPO bait, local privilege escalations in Linux were a dime a dozen (not always as universally exploitable, but plenty).
panny•33m ago
This means Linux is getting better faster than alternatives :) With many eyes, all bugs are shallow, and now there are nearly infinite AEyes looking at the source code. In a year, Linux will be the most bulletproof operating system ever.
NooneAtAll3•26m ago
Time to port everything to RedoxOS? =)

Bun's experimental Rust rewrite hits 99.8% test compatibility on Linux x64 glibc

https://twitter.com/jarredsumner/status/2053047748191232310
214•heldrida•11h ago•230 comments

Internet Archive Switzerland

https://blog.archive.org/2026/05/06/internet-archive-switzerland-expanding-a-global-mission-to-pr...
467•hggh•9h ago•69 comments

FreeBSD: Local Privilege Escalation via Execve()

https://www.freebsd.org/security/advisories/FreeBSD-SA-26:13.exec.asc
33•Deeg9rie9usi•1h ago•15 comments

I’ve banned query strings

https://chrismorgan.info/no-query-strings
164•susam•5h ago•74 comments

Zed Editor Theme-Builder

https://zed.dev/theme-builder
101•cuechan•4h ago•34 comments

CPanel's Black Week: 3 New Vulnerabilities Patched After Attack on 44k Servers

https://www.copahost.com/blog/cpanels-black-week-three-new-vulnerabilities-patched-after-ransomwa...
81•ggallas•4h ago•44 comments

Production engineering when trading billions of dollars a day [video]

https://www.youtube.com/watch?v=zR9PpXWsKFQ
38•abstrus•1d ago•2 comments

I caught the car

https://undecidability.net/senior/
12•holden_nelson•1h ago•1 comments

Distributing Mac software is increasing my cortisol levels

https://blog.kronis.dev/blog/apple-is-increasing-my-cortisol-levels
129•LorenDB•6h ago•69 comments

Google broke reCAPTCHA for de-googled Android users

https://reclaimthenet.org/google-broke-recaptcha-for-de-googled-android-users
1408•anonymousiam•1d ago•505 comments

LLMs corrupt your documents when you delegate

https://arxiv.org/abs/2604.15597
297•rbanffy•12h ago•117 comments

Meta's Embrace of A.I. Is Making Its Employees Miserable

https://www.nytimes.com/2026/05/08/technology/meta-ai-employees-miserable.html
132•JumpCrisscross•3h ago•80 comments

The hypocrisy of cyberlibertarianism

https://matduggan.com/the-intolerable-hypocrisy-of-cyberlibertarianism/
208•ColinWright•7h ago•165 comments

The ROKR wooden typewriter: a closer look

http://writingball.blogspot.com/2026/05/the-rokr-wooden-typewriter-closer-look.html
19•speckx•2d ago•2 comments

PipeDream on the Acorn Archimedes

https://stonetools.ghost.io/pipedream-archimedes/
64•msephton•6h ago•22 comments

Using Claude Code: The unreasonable effectiveness of HTML

https://twitter.com/trq212/status/2052809885763747935
384•pretext•16h ago•230 comments

A recent experience with ChatGPT 5.5 Pro

https://gowers.wordpress.com/2026/05/08/a-recent-experience-with-chatgpt-5-5-pro/
565•_alternator_•18h ago•405 comments

OpenAI’s WebRTC problem

https://moq.dev/blog/webrtc-is-the-problem/
456•atgctg•2d ago•138 comments

Mythical Man Month

https://martinfowler.com/bliki/MythicalManMonth.html
318•ingve•2d ago•182 comments

How LEDs are made (2014)

https://learn.sparkfun.com/tutorials/how-leds-are-made/all
116•smig0•2d ago•19 comments

America's carpet capital: an empire and its toxic legacy

https://apnews.com/projects/pfas-forever-stained/
145•rawgabbit•3d ago•90 comments

Random tie knots (2014)

https://tieknots.how/
5•surprisetalk•3d ago•1 comments

GrapheneOS fixes Android VPN leak Google refused to patch

https://cyberinsider.com/grapheneos-fixes-android-vpn-leak-google-refused-to-patch/
214•Georgelemental•7h ago•63 comments

David Attenborough's 100th Birthday

https://www.bbc.com/news/articles/cp3pww9g0p5o
828•defrost•1d ago•158 comments

Introduction to Beaver Triples

https://stoffelmpc.com/stoffel-blog/beaver-triples-tuples
17•badcryptobitch•5h ago•10 comments

Show HN: Mochi.js: bun-native high-fidelity browser automation library

https://mochijs.com/
28•ccheshirecat•7h ago•14 comments

Building the TD4 4-Bit CPU

https://jayakody2000lk.blogspot.com/2026/05/building-td4-4-bit-cpu.html
47•zdw•2d ago•14 comments

What causes lightning? The answer keeps getting more interesting

https://www.quantamagazine.org/what-causes-lightning-the-answer-keeps-getting-more-interesting-20...
178•Tomte•3d ago•41 comments

Reviving the IBM Selectric Composer Fonts (2023)

https://www.kutilek.de/selectric/
61•tangus•3d ago•5 comments

Wi is Fi: Understanding Wi-Fi 4/5/6/6E/7/8 (802.11 n/AC/ax/be/bn)

https://www.wiisfi.com/
360•homebrewer•3d ago•95 comments