'For many such issues the simplest mitigation is to stop calling the buggy function. Killswitch provides that': Experts propose Linux kernel "killswitch" following worrying recent security issues

Cybersecurity
(Image credit: Shutterstock)

  • Maintainers proposed a killswitch mechanism to temporarily disable vulnerable kernel functions at runtime via securityfs
  • The feature aims to mitigate high‑severity flaws like Copy Fail and Dirty Frag until patches arrive, though it risks system instability
  • It’s under community review, positioned as a stopgap measure—not a replacement for proper patching

The Linux kernel could soon get a new feature that serves as a temporary safeguard against high-severity vulnerabilities until patches are deployed.

One of the Linux stable kernel co-maintainers, Sasha Levin, recently proposed a new patch that would allow system administrators to temporarily disable a vulnerable kernel function.

That way, if security researchers discover malicious code in the future, users would be able to quickly instruct the kernel not to use it. The feature would not address underlying issues, but since the function would return an error, it could prevent the vulnerability from causing any serious harm before a proper patch is deployed.

Latest Videos From

Good idea, does (not) work?

If adopted, the feature would be available through the kernel’s securityfs interface, allowing admins to enable killswitches for specific functions which would render them unusable immediately. The change would take effect at runtime, and would remain active until disabled, or until the system is restarted.

On paper, the idea sounds good. In practice, there are many challenges and moving parts to address. When a function is disabled, it could disrupt the entire system or crash other parts. It could also introduce additional vulnerabilities.

Therefore, it is important to note that the feature is not imagined for general purpose use. It is also worth mentioning that this feature cannot serve as a replacement for patching.

Still, it could be a solid first-aid kit to prevent further escalation with high-severity vulnerabilities.

According to Linuxiac, the idea for the proposed patch came after the disclosure of two critical Linux kernel vulnerabilities - Copy Fail and Dirty Frag. The former was discovered in early March 2026, granting malicious actors privileged access across all major Linux distributions. The latter, on the other hand, was discovered late last week. It, too, was a zero-day that allows root privileges, but at the moment of disclosure, it did not have a patch which made it extremely dangerous.

The new feature is currently being reviewed by the Linux community and has not yet been introduced.


Best antivirus software header
The best antivirus for all budgets

Google logo on a black background next to text reading 'Click to follow TechRadar'

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.


TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.