Sign Up to Our Newsletter

Be the first to know the latest tech updates

Tech News

‘For many such issues the simplest mitigation is to stop calling the buggyfunction. Killswitch provides that’: Experts propose Linux kernel “killswitch” following worrying recent security issues

‘For many such issues the simplest mitigation is to stop calling the buggyfunction. Killswitch provides that’: Experts propose Linux kernel “killswitch” following worrying recent security issues



  • Maintainers proposed a killswitch mechanism to temporarily disable vulnerable kernel functions at runtime via securityfs
  • The feature aims to mitigate high‑severity flaws like Copy Fail and Dirty Frag until patches arrive, though it risks system instability
  • It’s under community review, positioned as a stopgap measure—not a replacement for proper patching

The Linux kernel could soon get a new feature that serves as a temporary safeguard against high-severity vulnerabilities until patches are deployed.

One of the Linux stable kernel co-maintainers, Sasha Levin, recently proposed a new patch that would allow system administrators to temporarily disable a vulnerable kernel function.

That way, if security researchers discover malicious code in the future, users would be able to quickly instruct the kernel not to use it. The feature would not address underlying issues, but since the function would return an error, it could prevent the vulnerability from causing any serious harm before a proper patch is deployed.

Latest Videos From

Good idea, does (not) work?

If adopted, the feature would be available through the kernel’s securityfs interface, allowing admins to enable killswitches for specific functions which would render them unusable immediately. The change would take effect at runtime, and would remain active until disabled, or until the system is restarted.

On paper, the idea sounds good. In practice, there are many challenges and moving parts to address. When a function is disabled, it could disrupt the entire system or crash other parts. It could also introduce additional vulnerabilities.

Therefore, it is important to note that the feature is not imagined for general purpose use. It is also worth mentioning that this feature cannot serve as a replacement for patching.

Still, it could be a solid first-aid kit to prevent further escalation with high-severity vulnerabilities.

According to Linuxiac, the idea for the proposed patch came after the disclosure of two critical Linux kernel vulnerabilities – Copy Fail and Dirty Frag. The former was discovered in early March 2026, granting malicious actors privileged access across all major Linux distributions. The latter, on the other hand, was discovered late last week. It, too, was a zero-day that allows root privileges, but at the moment of disclosure, it did not have a patch which made it extremely dangerous.

The new feature is currently being reviewed by the Linux community and has not yet been introduced.


Best antivirus software header

The best antivirus for all budgets


Google logo on a black background next to text reading 'Click to follow TechRadar'

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.




Source link

Team TeachToday

Team TeachToday

About Author

TechToday Logo

Your go-to destination for the latest in tech, AI breakthroughs, industry trends, and expert insights.

Get Latest Updates and big deals

Our expertise, as well as our passion for web design, sets us apart from other agencies.

Digitally Interactive  Copyright 2022-25 All Rights Reserved.