Overview
Description
Statistics
- 17 Posts
- 6 Interactions
Fediverse
New Ivanti EPMM Zero-Day CVE-2026-6973 Actively Exploited — Patch Immediately
#CyberSecurity
https://securebulletin.com/new-ivanti-epmm-zero-day-cve-2026-6973-actively-exploited-patch-immediately/
🚨 Ivanti Endpoint Manager Mobile flaw (CVE-2026-6973) is being exploited in limited attacks, enabling remote code execution with admin access.
CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.
Read: https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html
The U.S. CISA has added a zero-day vulnerability (CVE-2026-6973) in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog, urging federal agencies to patch by May 10, 2026. This flaw, requiring admin privileges, allows for arbitrary code execution and is already being exploited.
https://securityaffairs.com/191822/security/u-s-cisa-adds-a-flaw-in-ivanti-endpoint-manager-mobile-epmm-to-its-known-exploited-vulnerabilities-catalog.html
Bluesky
Overview
Description
Statistics
- 12 Posts
- 5 Interactions
Fediverse
Critical Palo Alto PAN-OS Zero-Day CVE-2026-0300 Actively Exploited — Root Access Granted on 5,800+ Exposed Firewalls
#CyberSecurity
https://securebulletin.com/critical-palo-alto-pan-os-zero-day-cve-2026-0300-actively-exploited-root-access-granted-on-5800-exposed-firewalls/
📰 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE
🚨 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS
Bluesky
Overview
Description
Statistics
- 7 Posts
- 36 Interactions
Fediverse
CopyFail (CVE-2026-31431) is a high-severity Linux kernel vulnerability -- patches are out now for Rocky Linux 8.10, 9.8, and 10.1.
Any unprivileged local user can escalate to root in seconds. Multi-tenant hosts, containers, and CI runners should prioritize this one.
Fix it with:
sudo dnf --refresh update 'kernel*'
Full write-up on the blog:
https://forums.rockylinux.org/t/copyfail-cve-2026-31431-patches-now-available-for-rocky-linux/20422
#RockyLinux #Linux #OpenSource #LinuxSecurity #CopyFail
Ok Ive been working through the mitigations for the string of kernel vulnerabilities. I think this is all of them. I had Claude spit out a summary.
Hope this helps others.
Linux Kernel LPE Roundup — May 7, 2026
Four local privilege escalation vulnerabilities in the same bug class (page-cache writes) are actively circulating. Here’s what you need to know:
1. Copy Fail (CVE-2026-31431)
Original page-cache write via algif_aead in the crypto subsystem. Patched upstream, distro patches available.
Mitigation: Blacklist algif_aead module, or apply your distro’s kernel update.
https://copy.fail/
2. Dirty Frag (no CVE yet)
Chains xfrm-ESP + RxRPC page-cache writes for a universal unprivileged LPE across all major distros. Published after a third party broke the embargo — no patches exist yet.
Mitigation: Blacklist esp4, esp6, and rxrpc modules.
https://github.com/V4bel/dirtyfrag/
3. Copy Fail 2: Electric Boogaloo (no CVE yet)
xfrm ESP-in-UDP variant using MSG_SPLICE_PAGES. Same class as Copy Fail, different subsystem. Autoloads esp4/xfrm modules via userns netlink. Upstream fix committed but not yet in stable branches.
Mitigation: Blacklist esp4 (same as Dirty Frag).
https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo
4. io_uring ZCRX Freelist LPE (no CVE yet)
Out-of-bounds write in io_uring’s zero-copy receive freelist. Narrower scope — requires kernel 6.15+, CONFIG_IO_URING_ZCRX=y, a supported NIC (mlx5/ice/nfp), and CAP_NET_ADMIN. Fix committed but not in stable yet.
Mitigation: Check grep CONFIG_IO_URING_ZCRX /lib/modules/$(uname -r)/config — if not set, you’re not affected.
https://ze3tar.github.io/post-zcrx.html
#linux #kernel #cve #vulnerability #copyfail #copyfail2 #dirtyfrag #security #infosec #sysadmin
Copy-Fail? More like Copy-Fixed. 🛑
At @DE-CIX, our customers depend on our availability and integrity. So when the Linux "Copy-Fail" vulnerability popped up, we took it super seriously and patched things up immediately.
During the mitigation process, one of our system engineers identified a completely alternative way to block the vulnerability using ftrace. Because it’s been supported in the kernel since 2013, it’s an incredibly accessible solution.
A nine-year Linux kernel bug is being actively exploited right now. CVE-2026-31431 (Copy Fail) gives any unprivileged local user a root shell. Works every time. Leaves no trace on disk. Patch status + fixes for Proxmox, Debian, and more in the video.
➡️➡️ Watch Here: https://youtu.be/LwqEUiuXmbg
ICYMI: CVE-2026-31431 (Copy Fail) gives any unprivileged local user a ROOT SHELL. Works every time. Leaves no trace on disk. Patch status + fixes for Proxmox, Debian, and more.
➡️➡️ Watch Here: https://youtu.be/LwqEUiuXmbg
variante peu sympa 👀
"Unprivileged Linux LPE via xfrm ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path. Page-cache write into any readable file. Overwrites a nologin line in /etc/passwd with sick::0:0:...:/:/bin/bash and sus into it. Same class as Copy Fail (CVE-2026-31431), different subsystem."
⬇️
https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo
Overview
Description
Statistics
- 7 Posts
- 22 Interactions
Fediverse
L'ensemble de notre parc infogéré est immunisé contre la faille Dirty Frag (CVE-2026-43284) depuis ce matin 08h59.
En gros, c'est l'enfant maudit de Dirty Pipe et Copy Fail qui permet une élévation locale de privilèges qui fonctionne très bien.
En savoir plus sur la faille-> https://github.com/V4bel/dirtyfrag#dirty-frag-universal-linux-lpe
CVE-2026-43284 selon almalinux.org
https://almalinux.org/blog/2026-05-07-dirty-frag/
⬇️
https://vulnerability.circl.lu/vuln/CVE-2026-43284
[related]
chez AlmaLinux
"Dirty Frag (CVE-2026-43284) vulnerability fix is ready for testing"
👇
https://almalinux.org/blog/2026-05-07-dirty-frag/
Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability. There's a mitigation that disables esp4, esp6 and rxrpc modules.
https://www.openwall.com/lists/oss-security/2026/05/07/8
https://github.com/V4bel/dirtyfrag
EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. https://nvd.nist.gov/vuln/detail/CVE-2026-43284 https://nvd.nist.gov/vuln/detail/CVE-2026-43500
Les deux vulnérabilités composant #DirtyFrag ont reçu leurs numéros CVE :
🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write
Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
https://vulnerability.circl.lu/vuln/CVE-2026-43284
Bluesky
Overview
Description
Statistics
- 4 Posts
- 1 Interaction
Fediverse
https://aisle.com/blog/aisle-discovers-cve-2026-42511-a-21-year-old-freebsd-remote-command-execution-vulnerability#the-vulnerability
Overview
Description
Statistics
- 3 Posts
- 16 Interactions
Fediverse
Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability. There's a mitigation that disables esp4, esp6 and rxrpc modules.
https://www.openwall.com/lists/oss-security/2026/05/07/8
https://github.com/V4bel/dirtyfrag
EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. https://nvd.nist.gov/vuln/detail/CVE-2026-43284 https://nvd.nist.gov/vuln/detail/CVE-2026-43500
Les deux vulnérabilités composant #DirtyFrag ont reçu leurs numéros CVE :
🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write
Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
https://vulnerability.circl.lu/vuln/CVE-2026-43284
Bluesky
Overview
Description
Statistics
- 2 Posts
- 2 Interactions
Overview
Description
Statistics
- 1 Post
- 18 Interactions
Overview
Description
Statistics
- 2 Posts
Fediverse
Overview
Description
Statistics
- 2 Posts
- 21 Interactions