StackTrack Support Centre
Go to website
Back
Articles on:Security Bulletins
No description

Categories

  • Jenkins Service
  • Managed Kubernetes Service
  • Security Bulletins
  • Refinery Runners for Jenkins
  • Identity Service
  • General
  • Scheduled Updates
  • 08-05-2026: Copy Fail and Dirty Frag - Linux Kernel Level Privilege Escalations
    Linux kernel privilege escalation advisory: Copy Fail and Dirty Frag Status: Active remediation Severity: High Last updated: 8 May 2026 Applies to: Linux servers, container hosts, Kubernetes nodes, CI runners, shared hosting systems, and managed infrastructure running affected Linux kernels Summary StackTrack is tracking two Linux kernel local privilege escalation vulnerability groups: Copy Fail and Dirty Frag. We are grouping these issues in one support notice becaFew readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
  • Send us an email
© 2026StackTrack Support Centre