Overview
Description
Statistics
- 23 Posts
- 53 Interactions
Fediverse
#CopyFail **UPDATE 2025-05-05:** Red Hat has released the kernel updates for Red Hat Enterprise Linux 9 and 10. So if you followed the steps I described in this thread, you can now simply do
dnf update
on affected machines to get the new kernel and do a
grubby --update-kernel=ALL --remove-args='initcall_blacklist=algif_aead_init'
to remove the mitigation described in this post, before you finish the process with a
reboot
to switch to the fixed kernel.
Kritische #Kernel #LĂŒcke bedroht zahlreiche #Linux Systeme - #fosstopia
#IT #Security #Forscher haben eine schwere #Schwachstelle im #Linux_Kernel offengelegt (CVE-2026-31431). Die LĂŒcke trĂ€gt den Namen Copy Fail und erlaubt lokalen Nutzern den Zugriff auf höchste Systemrechte (root). Angreifer können gezielt vier Bytes in den Seitencache beliebiger Dateien schreiben und so die Kontrolle ĂŒber ein System ĂŒbernehmen...
NicFab Newsletter #19 is out.
This week:
â EDPB marks 10 years of GDPR
â AI Act trilogue stalls â high-risk rules still set for 2 August 2026
â EU Age Verification App found vulnerable hours after launch
â First European standard on trusted data transactions (EN 18235-1:2026)
â CopyFail (CVE-2026-31431) added to CISA KEV
â Minnesota first US state to ban nudification apps
https://www.nicfab.eu/en/newsletter-issues/2026-05-05-issue-19/
Red Hat product updates to copy fail available https://access.redhat.com/security/cve/cve-2026-31431
AlmaLinux 10.2 Beta is now live!
The release team of AlmaLinux, which is a free binary-compatible alternative to a commercial Linux distribution, Red Hat Enterprise Linux, has just released the beta version of the upcoming point release, which is AlmaLinux v10.2.
This beta version of AlmaLinux brings many improvements over the current version, which is version v10.1. The version is available for the following architectures listed:
- Intel/AMD (x86_64)
- Intel/AMD (x86_64_v2)
- Intel/AMD 32-bit (i686) (userspace only, no installation)
- ARM64 (aarch64)
- IBM PowerPC (ppc64le)
- IBM Z (s390x)
However, this beta version of AlmaLinux is not a production release, and is not guaranteed to be stable, especially when it comes to production installations. For users who rely on stability, youâll have to wait until the official release. If you are curious about this beta version, and you intend to test and to report bugs and issues, you can download the beta version here.
AlmaLinux 10.2 brings i686 userspace packages to enable legacy 32-bit software, CI pipelines, and containerized workloads for users who rely on them in their workflow. It also presents you with updated toolsets and packages, such as the updated MariaDB 11.8, PHP 8.4, and Python 3.14. Security updates have also been provided, such as OpenSSL, Keylime, and SELinux policies, to enhance your computerâs security and to reduce attack vectors.
Also, a severe vulnerability that was left unnoticed since 2017, called Copy Fail (CVE-2026-31431) that exposed a flaw in authencesn, has been patched in this version of AlmaLinux, along with versions v10.x, v9.x, and v8.x.
You can learn more about this beta version here.
Learn more Download #AlmaLinux #AlmaLinux10 #AlmaLinux102 #Linux #news #Tech #Technology #updateHeads up: CVE-2026-31431 (Copy Fail) is a kernel crypto vulnerability affecting Rocky Linux. Our community is on it: tracking patches and sharing Rocky-specific guidance as it develops.
If you're running Rocky in production, check the forum thread for the latest:
https://forums.rockylinux.org/t/cve-2026-31431-copy-fail-linux-kernel-crypto-vulnerability/20375/8
#RockyLinux #LinuxSecurity #OpenSource
"CISA flags actively exploited âCopy Failâ Linux kernel flaw enabling root takeover across major distros â unpatched systems may remain vulnerable to attack"
"CISA warns of the actively exploited âCopy Failâ Linux flaw (CVE-2026-31431), enabling root access, with a public exploit released before patches were ready."
copy.fail (CVE-2026-31431): a small Linux kernel bug with an unusually big blast radius | Jorijn Schrijvershof https://jorijn.com/en/blog/copy-fail-cve-2026-31431-linux-kernel-bug-explained/
"CopyFail" (CVE-2026-31431) : un utilisateur local sans privilĂšge peut Ă©crire 4 bytes contrĂŽlĂ©s dans le cache de TOUT fichier lisible âĄïž Ă©lĂ©vation root. Si vous avez du multi-tenant, des conteneurs, des CI runners non fiables : mettre Ă jour. Ordinateur perso ? Moins urgent mais mettez Ă jour quand mĂȘme.
L'article : https://xint.io/blog/copy-fail-linux-distributions (en)
Le site : https://copy.fail/ (en)
#linux #cybersecurity
Bluesky
Overview
Description
Statistics
- 12 Posts
- 7 Interactions
Fediverse
Falla in cPanel e WHM mette a rischio gli account amministrativi sui server di hosting
@informatica
La pubblicazione di un PoC per la CVE-2026-41940 espone cPanel & WHM e WP Squared a rischi concreti di takeover. Lâauthentication bypass puĂČ compromettere server hosting e siti WordPress. Analisi tecnica, impatti e contromisure per
cPanel zero-day active:
40K+ servers hit
CVE-2026-41940
â auth bypass
â admin access
Patch immediately.
Source: https://www.securityweek.com/over-40000-servers-compromised-in-ongoing-cpanel-exploitation/
Follow @technadu
đš In this weekâs newsletter, we cover CVE-2026-41940, a cPanel & WHM authentication bypass that puts entire hosting environments at risk. We break down how it enables admin access and what defenders should do next.
Read the full analysis and protect your systems đ https://www.crowdsec.net/vulntracking-report/cve-2026-41940-cpanel-whm-authentication-bypass-exploitation
đ° cPanel Zero-Day Auth Bypass (CVE-2026-41940) Actively Exploited for Months Before Patch
đš CRITICAL ZERO-DAY đš cPanel & WHM auth bypass (CVE-2026-41940, CVSS 9.8) exploited for months before patch! Unauthenticated attackers can get root access. 1.5M instances exposed. Patch NOW! #cPanel #ZeroDay #CVE #WebHosting
Bluesky
Overview
- Apache Software Foundation
- Apache HTTP Server
Description
Statistics
- 4 Posts
- 15 Interactions
Fediverse
Critical Apache HTTP Server 2.4.67 Patches RCE Flaw CVE-2026-23918 â Upgrade All Servers Immediately
#CyberSecurity
https://securebulletin.com/critical-apache-http-server-2-4-67-patches-rce-flaw-cve-2026-23918-upgrade-all-servers-immediately/
Several vulnerabilities in #Apache HTTP Server 2.4 have been fixed in release 2.4.67. The most severe of these are:
- CVE-2026-23918: Apache HTTP Server: http2: double free and possible RCE on early reset
- CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr
- CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing attack
https://httpd.apache.org/security/vulnerabilities_24.html
#CVE_2026_23918 #CVE_2026_24072 #CVE_2026_33006 #infosec #cybersecurity
Bluesky
Overview
- Weaver Network Co., Ltd.
- E-cology
Description
Statistics
- 3 Posts
- 5 Interactions
Bluesky
Overview
Description
Statistics
- 3 Posts
- 24 Interactions
Fediverse
AISLE boasts about their AI tooling and CVE-2026-42511:
"Our autonomous AI system found another critical vulnerability in the FreeBSD DHCP stack - an unauthenticated remote code execution vulnerability with root privileges.
This finding is significant not only because RCE as root is about as severe as it gets, but also because FreeBSD was explicitly included in Anthropicâs Mythos announcement, and Mythos did not identify this issue."
Not sure if it was a good idea to look this closely: CVE-2026-42511 (#freebsd #dhclient) looks awfully similar to CVE-2011-0997 (isc-dhcp).
Overview
Description
Statistics
- 2 Posts
Fediverse
https://clearbluejar.github.io/posts/pyghidra-mcp-meets-ghidra-gui-drive-project-wide-re-with-local-ai/
+ CVE-2024-3273 analysis (D-Link)
Overview
- Progress Software
- MOVEit Automation
Description
Statistics
- 3 Posts
Bluesky
Overview
Description
Statistics
- 1 Post
- 7 Interactions
Fediverse
Critical Android Zero-Click Vulnerability CVE-2026-0073 Allows Remote Shell Access Without User Interaction
#CyberSecurity
https://securebulletin.com/critical-android-zero-click-vulnerability-cve-2026-0073-allows-remote-shell-access-without-user-interaction/
Overview
- argoproj
- Argo CD
Description
Statistics
- 1 Post
- 2 Interactions
Overview
Description
Statistics
- 2 Posts
- 2 Interactions