<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - Linux</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ Linux feed</description>
    <item>
      <title>Copy Fail and Dirty Frag: Linux Page-Cache Exploits Target Every Major Distribution</title>
      <link>https://www.infoq.com/news/2026/05/copy-fail-dirty-frag-linux/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Linux</link>
      <description>&lt;img src="https://res.infoq.com/news/2026/05/copy-fail-dirty-frag-linux/en/headerimage/generatedHeaderImage-1778536323907.jpg"/&gt;&lt;p&gt;Two recent Linux kernel vulnerabilities have been disclosed: Copy Fail (CVE-2026-31431) on April 29, 2026, and Dirty Frag (CVE-2026-43284 and CVE-2026-43500) on May 7, 2026. Both allow local users to gain root access, affecting multiple Linux distributions. These vulnerabilities exploit flaws in the page cache via different subsystems, necessitating immediate patching by affected organizations.&lt;/p&gt; &lt;i&gt;By Matt Saunders&lt;/i&gt;</description>
      <category>Linux</category>
      <category>Security Vulnerabilities</category>
      <category>DevOps</category>
      <category>news</category>
      <pubDate>Tue, 12 May 2026 08:00:00 GMT</pubDate>
      <guid>https://www.infoq.com/news/2026/05/copy-fail-dirty-frag-linux/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Linux</guid>
      <dc:creator>Matt Saunders</dc:creator>
      <dc:date>2026-05-12T08:00:00Z</dc:date>
      <dc:identifier>/news/2026/05/copy-fail-dirty-frag-linux/en</dc:identifier>
    </item>
  </channel>
</rss>
