<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>devtake.dev — Red Hat</title><description>Articles on devtake.dev covering Red Hat.</description><link>https://devtake.dev/</link><language>en-us</language><item><title>A nine-year-old Linux kernel bug gives root in one command. No patch exists yet.</title><link>https://devtake.dev/article/linux-dirty-frag-kernel-privilege-escalation/</link><guid isPermaLink="true">https://devtake.dev/article/linux-dirty-frag-kernel-privilege-escalation/</guid><description>Dirty Frag chains two page-cache flaws in the ESP and RxRPC subsystems into a deterministic privilege escalation that hits every major distro. A PoC exploit is public.</description><pubDate>Sun, 10 May 2026 10:00:00 GMT</pubDate><category>security</category><category>security</category><category>linux</category><category>kernel</category><category>cve-2026-43284</category><category>privilege-escalation</category><category>zero-day</category><category>dirty-frag</category><author>luca-reinhardt</author></item><item><title>&apos;Copy Fail&apos; lets a 732-byte script grab root on Ubuntu, RHEL, and SUSE. Patched April 29.</title><link>https://devtake.dev/article/copy-fail-linux-kernel-page-cache-root/</link><guid isPermaLink="true">https://devtake.dev/article/copy-fail-linux-kernel-page-cache-root/</guid><description>CVE-2026-31431 chains AF_ALG and splice() to write into the page cache of /usr/bin/su. Xint Code disclosed it on April 29, nine years after the bug shipped.</description><pubDate>Thu, 30 Apr 2026 09:15:00 GMT</pubDate><category>security</category><category>security</category><category>linux</category><category>cve-2026-31431</category><category>kernel</category><category>privilege-escalation</category><category>supply-chain</category><category>ubuntu</category><category>rhel</category><author>luca-reinhardt</author></item></channel></rss>