24h | 7d | 30d

Overview

  • Linux
  • Linux

22 Apr 2026
Published
30 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 103 Posts
  • 522 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Ooooh, nice:

xint.io/blog/copy-fail-linux-d

CVE-2026-31431: Local privilege escalation to root using a trivial 732 byte python script for pretty much every Linux distribution since 2017.

#CopyFail

  • 37
  • 25
  • 0
  • 18h ago
Profile picture fallback

Si sois sysadmins de Linux mejor no hagáis planes para el puente... copy.fail/

#copyfail #cve_2026_31431

  • 17
  • 11
  • 0
  • 2h ago
Profile picture fallback

I’m a bit surprised they did not wait till a patch was available for the major distros. Smells like an IPO or the next round of funding is coming soon.

You probably want to keep a close eye on any system you maintain where unprivileged users have shell access and update as soon as possible.

copy.fail

security-tracker.debian.org/tr

ubuntu.com/security/CVE-2026-3

suse.com/security/cve/CVE-2026

#copyfail

  • 16
  • 8
  • 0
  • 17h ago
Profile picture fallback

The CopyFail folks shouldn't have routed stderr to /dev/null in their workaround guidance. For some platforms, where it's not a module ... that mitigation is a no-op:

$ rmmod algif_aead
rmmod: ERROR: Module algif_aead is builtin.

So if there's no kernel patch available yet, you can't use that workaround. Instead, use AppArmor / seccomp / SELinux to block unprivileged AF_ALG socket creation if you can (but don't just turn these hardening layers up if they''re not already in place - they can be tricky)

  • 14
  • 25
  • 0
  • 14h ago
Profile picture fallback
  • 14
  • 10
  • 0
  • 6h ago
Profile picture fallback

Copy Fail — CVE-2026-31431
copy.fail/

Istheinternetburning ?

  • 13
  • 8
  • 1
  • 18h ago
Profile picture fallback

this fixed it for me:

cat >/etc/modprobe.d/disable-algif-aead.conf <<'EOF'
install algif_aead /bin/false
blacklist algif_aead
EOF

depmod -a

rmmod algif_aead

i tested with this: github.com/rootsecdev/cve_2026

  • 11
  • 21
  • 0
  • 14h ago
Profile picture fallback

RE: hachyderm.io/@petrillic/116489

I have had a confirmation that it can work on the Amazon Linux kernel, but also RHEL says "fix deferred" for all affected RHEL versions: access.redhat.com/security/cve

  • 11
  • 17
  • 0
  • 17h ago
Profile picture fallback

Wir checken Eure Linux-Distro! Kommt beim nächsten #DiDay mit euren abgehangenen 5-er Kerneln vorbei und wir halten Händchen, während wir gemeinsam exploit.py von CVE-2026-31431 ausführen.

  • 8
  • 40
  • 0
  • 16h ago
Profile picture fallback

As people rightly highlight that the #CopyFail fix status in various #Linux distros is… confusing, it’s worth keeping in mind you can deploy the workaround everywhere with no side effects:

# echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
# rmmod algif_aead 2>/dev/null || true

By ‘confusing’ I mean:

  • 10
  • 2
  • 0
  • 8h ago
Profile picture fallback

Mitigation to / :

- If kernel config has CONFIG_CRYPTO_USER_API_AEAD=m:

echo "install algif_aead /bin/false" | sudo tee /etc/modprobe.d/disable-algif.conf; sudo rmmod algif_aead

- If kernel config has CONFIG_CRYPTO_USER_API_AEAD=y:

Add "initcall_blacklist=algif_aead_init" to the kernel command line and reboot.

openwall.com/lists/oss-securit

  • 9
  • 7
  • 0
  • 7h ago
Profile picture fallback

⚠️ : Major Linux distributions are impacted by a Privilege Escalation Vulnerability dubbed "CopyFail" (CVE-2026-31431) which sat undetected since 2017.
A 732-byte Python script allows any user on Linux to become root:


👇
cyberkendra.com/2026/04/a-732-

  • 7
  • 5
  • 1
  • 14h ago
Profile picture fallback

> If your kernel was built between 2017 and the patch — which covers essentially every mainstream Linux distribution — you're affected.

#CVE-2026-31431

copy.fail

#CopyFail #SysAdmin #Exploit #Kernel #Linux #Security

  • 6
  • 6
  • 1
  • 16h ago
Profile picture fallback

copy.fail (CVE-2026-31431) explained: a small Linux kernel bug with an unusually big blast radius

jorijn.com/en/blog/copy-fail-c

#Linux #CyberSecurity #CVE #copyfail #jorijncom

  • 6
  • 2
  • 0
  • 1h ago
Profile picture fallback

Very unfortunate that the fix for CVE-2026-31431 isn't easily backportable, with a new API being added, and then its implementation details changing, since the last LTS (6.12 vs 6.18).

  • 5
  • 5
  • 0
  • 12h ago
Profile picture fallback

qucik mitigation for the copy.fail linux privilage excalation in case you can't reboot your systems right now:

Step 1:
make sure the algif_aead module is not loaded -> lsmod | grep algif_aead
Step 2:
find /lib/modules/$(uname -r) -iname '*algif_aead*' -print -delete

#CopyFail #CVE_2026_31431

  • 4
  • 13
  • 0
  • 16h ago
Profile picture fallback

copy.fail/

Local Privilege Escalation in every Linux kernel since 2017

Hopefully no one is sitting on a low-privilege RCE...

  • 5
  • 3
  • 0
  • 7h ago
Profile picture fallback

The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

Mitigations were extremely thin at launch, and haven't improved much, and are even brittle and misleading:

infosec.exchange/@tychotithonu

They've also largely neglected most of the value of the feedback they're getting from defenders clamoring for useful intel. The GitHub repo is full of feedback about which distros are affected or unaffected ... and a day later, none of it has been used to update the list of affected versions in the main README (except for the RHEL made-up version fix)

And this exchange is painful:

github.com/theori-io/copy-fail

"None of us are RH people so it wasn't caught" 😐 You had weeks do basic vetting, or find someone who would help you.

Theori seems to have to have intended this to be a showcase for their product. Instead, it has convinced me that I will never buy anything from them.

Edit: Will Dorman goes into more detail here, 100% agreed:
infosec.exchange/@wdormann/116

  • 4
  • 4
  • 0
  • Last hour
Profile picture fallback

Copy Fail (copy.fail/, CVE-2026-31431) is a good reminder why I don’t want to run CI jobs only in containers.

It would be great to get some momentum to code.forgejo.org/forgejo/forge (microVMs for forgejo actions). At least on bare metal (or nested VMs with nested KVM) this would make things a lot safer. It would also simplify the usage of containers/docker in CI jobs without compromising security, which is kind of a pain with Codeberg Action currently.

#security

  • 4
  • 3
  • 1
  • 6h ago
Profile picture fallback

On se marre bien aujourd'hui, avec CVE-2026-31431

Et la faille est encore plus drôle qu'il me semble bien que sur RedHat 8 et 9 et leurs cousines, “algif_aead” est compilé en statique bien dur dans le noyau et n'est donc pas un module qu'on peut blacklister en contournement 👌🥳

copy.fail

  • 3
  • 1
  • 0
  • 4h ago
Profile picture fallback

PSA for sysadmins: master.almalinux-org.pages.dev

TL;DR anyone with an unpriviledged shell can become root with a small exploit. One mean fucker, so be sure to update ASAP once available if you're within blast radius.

#sysadmin #Linux #psa #cve

  • 2
  • 3
  • 0
  • 3h ago
Profile picture fallback

Joker voice: Just wait 'til malicious agents and oberly aggressive users get a load of CVE-2026-31431

  • 2
  • 2
  • 0
  • 11h ago
Profile picture fallback

Hello

I am here to ruin your day again

copy.fail/ / CVE-2026-31431

Seems RHEL don't think this is all that important, CloudLinux's kernel image (presumably derived from RHEL) has the problem module built in, so you can't even mitigate while we wait for patching. CageFS does help as - afaict - no setuid binaries are included in the default cagefs env. Many Debian versions lack a patch at time of writing, but blocking the module did work for me.

#infosec #linux #vulnerability

  • 2
  • 1
  • 0
  • 17h ago
Profile picture fallback

#linux #kernel #exploit - I completely missed this one:

bugcrowd.com/blog/what-we-know

Privilege escalation on all linux kernels since 2017. And I cannot even see if my current ubuntu kernel has a patch for it...

Gotta sign up on some more security accounts here!

  • 2
  • 1
  • 0
  • 7h ago
Profile picture fallback
  • 2
  • 0
  • 0
  • 2h ago
Profile picture fallback

This is what I'm pasting into my own linux systems to implement the mitigation suggested at the website.
It may not be right for you. The 'chattr +i' may make it more difficult to undo!
MIT license, or at least its disclaimers, apply.

f=disable-algif_aead-CVE-2026-31431.conf
if ! [ -d /etc/modprobe.d ]; then
printf 'This system does not seem to have a /etc/modprobe.d dir, so this script would need to be adapted.\n' >&2
return 74
else
sudo /bin/env -i /bin/sh -c 'set -x;set -e;cd /etc/modprobe.d;umask 133;printf '\''install algif_aead /bin/false\n'\'' >'"$f"';chattr +i '"$f"
fi
sudo /bin/env -i /bin/sh -c '(set -x;rmmod -v algif_aead)2>&1|grep -v "is not currently loaded"'
ls -l /etc/modprobe.d/$f
cat -t /etc/modprobe.d/$f

  • 1
  • 4
  • 0
  • 15h ago
Profile picture fallback

So, copy.fail was found with one hour of AI assistance, and would (according to this article) have earned $500K on the open market not too long ago.

bugcrowd.com/blog/what-we-know

I'm no security researcher, but this kind of contradicts all those people who said that the OpenBSD bug that Mythos found (for $20K of compute) was just fancy fuzzing, and the only reason it was there was that nobody was investing 20K in OpenBSD security and the security threat of modern AI was all hype.

  • 1
  • 1
  • 0
  • 3h ago
Profile picture fallback

@LaurentChemla

Good explanation [1] including "For immediate mitigation" (consistent with most other descriptions on how to immediately prevent the exploit while waiting for your distribution to fix it properly).

Debian security tracker [2].

#cve_2026_31431 #CVE_2026_31431

[1] xint.io/blog/copy-fail-linux-d

[2] security-tracker.debian.org/tr

  • 1
  • 1
  • 0
  • 3h ago
Profile picture fallback

Raspberry Pi folks worried about CVE-2026-31431 'copy fail'.

Add this to the end of the line in /boot/firmware/cmdline.txt

initcall_blacklist=algif_aead_init

Then reboot with sudo systemctl reboot.

Check that it worked with

dmesg | fgrep 'blacklisting initcall algif_aead_init'

expect to see

[ 0.000000] blacklisting initcall algif_aead_init

You're now good against this issue.

#raspberrypi

  • 1
  • 1
  • 0
  • Last hour
Profile picture fallback
  • 1
  • 0
  • 0
  • 7h ago
Profile picture fallback

むー?まずいか?
Linuxカーネルの脆弱性「CopyFail (CVE-2026-31431)」をEC2のUbuntu 22.04で実証してみた
https://zenn.dev/aeyesec/articles/7e4a1e3c83e81b

  • 1
  • 0
  • 1
  • 5h ago
Profile picture fallback

So... came home to a proverbial tire fire. CVE-2026-31431

Yay. I am bold and DGAF so I made the call to shut off all login access (a call backed up by my peers shortly after).

Users who don't check their mail, look at status, or check our websites will be sending in 'URGENT' tickets any minute now.

  • 0
  • 5
  • 0
  • 11h ago
Profile picture fallback

@mttaggart

Editing to add:

RHEL has now updated the severity and the fix is no longer "deferred" for all affected OSes.

Looks like it requires a local user account, with a password set, to exploit, yes?

access.redhat.com/security/cve

  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback

@fanf42 → lets an unprivileged local user write into the page cache and obtain root
CVE-2026-31431, no score yet at NIST

  • 0
  • 1
  • 0
  • 7h ago
Profile picture fallback

@chuso Probably worth mentioning the related bug on #Gentoo Bugzilla.

bugs.gentoo.org/show_bug.cgi?i

Looks like @thesamesam is well and truly onto it.

Also for #Debian users, at the moment they're working on fixes: security-tracker.debian.org/tr

Edit: Nothing seen on the #AlpineLinux front, I guess we'll hear from @alpinelinux in due course.

  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback

Toch altijd wel knap wat hackers weten te vinden.

'Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017.'

"Copy Fail — CVE-2026-31431"

copy.fail/

  • 0
  • 1
  • 0
  • 2h ago
Profile picture fallback

OhMyDebn 3.6.3 now available with Copy Fail CVE-2026-31431 exploit mitigation, OpenCode 1.14.30, and Aether 4.15.3!

OhMyDebn is a debonair Linux desktop for power users. It gives you the stability of the Debian distro, the ease of use of the Cinnamon desktop, and the power of AI, containers, and virtualization.

  • 0
  • 1
  • 0
  • 1h ago
Profile picture fallback

Copy-fail-CVE-2026-31431 is the best #bug I've ever seen, just test it and it works, I got to be #root

I'm amazed

#copy-fail #exploit #linux

  • 0
  • 1
  • 0
  • 1h ago
Profile picture fallback

I'm not sure if this will help and I haven't been able to test all of these yet (just don't have everything set up for it), but I've tried to put out some detections for #cve-2026-31431 for Wazuh, Auditd and MISP and YARA items.

Mileage will vary on this until it can be tested a bit more thoroughly. Please feel free to drop a PR if you have better updates to what's here.

github.com/insomnisec/Detectio

#cyber #linux #lpe #vulnerability #cve

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

CVE-2026-31431 #copyfail Tetragon Tracing Policy - Kill unprivileged aead_recvmsg. This is the low-level customization of configuration policies your #Linux EDR should have. Also, watch out for processes running NULL argv gist.github.com/cr0nx/3079c573

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
CopyFail (CVE-2026-31431) — a 732-byte Python script that roots every Linux distro shipped since 2017. 🧵
https://x.com/i/status/2049533584097362272
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback

@giggls Verdammt, ja. Das ist die richtige ID:
euvd.enisa.europa.eu/vulnerabi

Die Bezeichnungen bei den Europäern sind irritierend. Warum müssen die eigene Nummern vergeben?
"EUVD-2026-24639"

  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback

@fooflington ich bins grade.
security-tracker.debian.org/tr
Einfach mal nen poc (nicht überprüft) raushauen ohne responsible disclosure fürn maximalen fame um den eigenen KI scanner zu promoten.

  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback

Me: Nothing bad ever happened on Wednesdays. I should be able to relax.
CopyFail:

  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback

so what do I even do at this point. the patch for CVE-2026-31431 isn't out yet on debian stable and the only fixes I see are to recompile the kernel which I have zero idea how to do

  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback

[VULN] ⚠️"Copy Fail - Une IA trouve la faille Linux que personne n'a vue"
" * Copy Fail (CVE-2026-31431) est une faille Linux qui permet de passer de simple utilisateur à root en 732 octets, affectant la quasi-totalité des kernels non patchés depuis 2017, découverte par une IA en une heure.

  • La faille exploite une optimisation de 2017 dans le sous-système crypto qui laisse un fichier en lecture seule accessible en zone modifiable, permettant de modifier progressivement un binaire système via l'appel splice().
  • Deux solutions de protection existent : patcher le kernel via la distro ou désactiver le module algif_aead (ou bloquer le sous-système crypto via seccomp si le module est intégré en dur)."👇 korben.info/copy-fail-faille-k

Demo / exploit ( via @bortzmeyer )
👇
bortzmeyer.org/copyfail.html

🔍
⬇️
vulnerability.circl.lu/vuln/CV

💬
⬇️
infosec.pub/post/45735124

  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback

Copy Fail (CVE-2026-31431): 732 bajty do przejęcia kontroli nad systemem ( nfsec.pl/security/6718 )

youtube.com/watch?v=-RuJTJga2fU

  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback

Can someone explain to me why was still unpatched on so many distros this morning when the blog post claims it was reported over a month ago to the kernel security team?

  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback

linux kernel question regarding #copyfail CVE-2026-31431 I just tested a c version of the exploit (github.com/tgies/copy-fail-c) on a riscv64 linux 5.10.4 (milkv-duo) and get
```
[+] target: /bin/su
[+] payload: 2064 bytes (516 iterations)
socket(AF_ALG): Address family not supported by protocol
patch_chunk failed at offset 0
```

I tested it on another risc64 SBC with a newer kernel which gained root but it seems like the exploit doesn't work on this kernel.

I'll do some more digging #riscv #milkv

  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

copy-fail-CVE-2026-31431/copy_fail_exp.py at main · theori-io/copy-fail-CVE-2026-31431 · GitHub

github.com/theori-io/copy-fail

  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

@hillu@infosec.exchange It is my understanding that this will not work. There is a published exploit (https://github.com/rootsecdev/cve_2026_31431/blob/main/exploit_cve_2026_31431.py) that messes with the page cache for /etc/passwd to simply show your user id as 0, so a normal call to su will make you root.

  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

@ubuntu Can you share when the updated packages to mitigate are likely to drop?

  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

Copy-fail: local privilege escalation in every Linux distro since 2017.

It is local, but shockingly easy to exploit.

copy.fail/

Exploit: github.com/theori-io/copy-fail

HackerNews: news.ycombinator.com/item?id=4

#cve202631431 #CopyFail

  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback

So... dealing with CVE-2026-31431 and I'm annoyed:

- I see vulnerable kernel versions in Debian, but MY kernel (as "uname -sr" tells me) is different
- yet my kernel on the system I tested was clearly faulty, as the exploit worked (and then didn't work when I employed the workaround)

So I need this workaround at least for now until a new kernel comes out (and I probably still won't let algif_aead insert after that anyway)

  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback

En las últimas 24 horas se han detectado vulnerabilidades críticas que afectan sistemas Linux, cPanel, routers de Solana y Adobe Acrobat, exponiendo a usuarios a escalada de privilegios, suplantación de autenticación, robo de tokens y ejecución remota de código; además, se reportan fallos en Cloudflare y un malware avanzado que amenaza sectores científicos. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 30/04/26 📆 |====

🔒 COPY FAIL — 732 BYTES TO ROOT

Se ha descubierto una vulnerabilidad crítica en Linux (CVE-2026-31431) que permite escalar privilegios a nivel root sin riesgo de condiciones de carrera ni necesidad de usar offsets. Esta falla evade las herramientas de integridad de archivos en disco y afecta incluso a entornos aislados como contenedores, representando un riesgo grave para la seguridad de sistemas Linux. Detectada por Xint Code, es esencial actualizar y proteger su infraestructura cuanto antes. Descubre más sobre esta vulnerabilidad y su impacto aquí 👉 djar.co/3ckGrI

🌐 LA INTERNET ESTÁ CAYENDO, CAYENDO, CAYENDO (CVE-2026-41940 EN CPANEL Y WHM)

Una falla de suplantación de autenticación ha sido identificada en cPanel y WHM, dos herramientas clave para la gestión de hosting. Esta vulnerabilidad permite a atacantes no autenticados obtener sesiones de usuario, inclusive con privilegios de administrador root, mediante un bypass completo en la autenticación. La amenaza compromete la seguridad de miles de servidores web, por lo que se recomienda aplicar los parches disponibles de inmediato. Infórmate sobre cómo proteger tus sistemas aquí 👉 djar.co/ScQtAV

🔗 VULNERABILIDAD EN EL ROUTER DE SOLANA

Importantes fallos de seguridad han sido detectados en el enrutador de la red Solana, facilitando el drenaje de cuentas de tokens y poniendo en riesgo la integridad de las transacciones financieras dentro de esta blockchain. Estas vulnerabilidades críticas podrían comprometer fondos y confianza en la plataforma, por lo que es imprescindible que los usuarios y desarrolladores tomen medidas urgentes para mitigar estos riesgos. Detalles y recomendaciones aquí 👉 djar.co/2clAA

📄 TRES VULNERABILIDADES EN ADOBE ACROBAT QUE COMPROMETEN SEGURIDAD

Adobe ha revelado tres vulnerabilidades críticas (CVE-2026-34621, CVE-2026-34622, CVE-2026-34626) que permiten la ejecución remota de código y la filtración de información mediante archivos PDF maliciosos. Estos fallos afectan versiones populares como Acrobat DC y Reader DC, poniendo en riesgo a millones de usuarios que manejan documentos digitales. Actualizar a la última versión es fundamental para evitar intrusiones y pérdidas de datos. Conoce los detalles y actualizaciones disponibles aquí 👉 djar.co/Rvvu5

🏛️ LA ESTRATEGIA DEL CONGRESO CONTRA BLOQUEOS MASIVOS DE IP POR LALIGA

El Congreso ha aprobado una reforma a la Ley de Servicios Digitales para evitar bloqueos masivos de direcciones IP que afecten a páginas ajenas en procesos contra la piratería, buscando un equilibrio entre la protección de derechos y la seguridad en internet. Esta medida evita que resoluciones judiciales derriben sitios web de terceros y promueve un entorno digital más seguro y regulado. Entiende el alcance y las implicaciones de esta reforma aquí 👉 djar.co/8dbV

☁️ VULNERABILIDADES CRÍTICAS EN LA IMPLEMENTACIÓN DE CLOUDFLARE

Se han reportado vulnerabilidades en los proxies de autorización y archivos PAC alojados por Cloudflare que afectan la gestión de políticas de seguridad de identidad sin necesidad de clientes en dispositivos finales. Estas fallas, aunque técnicas, representan un avance en cómo se protegen las redes y requieren atención para evitar posibles explotaciones. Mantente informado sobre cómo estas vulnerabilidades impactan la seguridad del entorno web aquí 👉 djar.co/Y6uR

🐛 DETECTANDO LA AMENAZA DEL MALWARE FAST16

Un malware avanzado, posiblemente desarrollado o patrocinado por un estado, ha sido identificado causando sabotajes discretos mediante la manipulación de programas matemáticos y simulaciones físicas. Esta amenaza tiene potencial para generar fallos graves, afectando sectores científicos y tecnológicos sensibles. La detección y respuesta temprana son claves para mitigar el daño. Aprende cómo proteger tus sistemas frente a Fast16 aquí 👉 djar.co/CN8X

  • 1
  • 1
  • 0
  • 2h ago

Bluesky

Profile picture fallback
Nouvelle faille de secu dans le kernel Linux depuis 2017 la veille d'un gros week-end : copy fail ou CVE-2026-31431 Un script python de 732 bits permet une élévation de privilège copy.fail
  • 11
  • 26
  • 0
  • 5h ago
Profile picture fallback
🚨 Copy Fail (CVE-2026-31431) Linux kernel LPE → page cache corruption → overwrite binaries → root. Public PoC dropped ~24h ago. Tested: ✔ Ubuntu 24.04 / 25.10 (x86_64 + ARM64) If you get code execution → you get root. PoC: github.com/pascal-gujer... #linux #infosec
  • 2
  • 3
  • 0
  • 5h ago
Profile picture fallback
La IA ha ajudat a descobrir una nova vulnerabilitat crítica a Linux: CVE-2026-31431 “Copy Fail” Un únic script Python de 732 línies permet a qualsevol usuari local obtenir accés root en pràcticament tots els sistemes Linux des de 2017. copy.fail
  • 1
  • 7
  • 0
  • 17h ago
Profile picture fallback
Copy Fail – CVE-2026-31431 | Discussion
  • 1
  • 2
  • 1
  • 19h ago
Profile picture fallback
CopyFail (CVE-2026-31431) in Go. In case you want to get root from a static binary without Python as a dependency. github.com/badsectorlab...
  • 0
  • 1
  • 1
  • 14h ago
Profile picture fallback
Major Linux distributions are patching a local privilege escalation vulnerability known as Copy Fail (CVE-2026-31431) due to a logic flaw in the kernel.
  • 0
  • 1
  • 0
  • 13h ago
Profile picture fallback
💡 Summary: Copy Failは、2017年以降のほぼ全ての主流Linuxディストリビューションで共通して存在する、権限のないローカルユーザーがページキャッシュへ4バイトを書き込み、root権限を取得できる直線的なLPE(CVE-2026-31431)です。影響はAF_ALGを経由した暗号処理経路の不具合を突くもので、パッチ適用後は再現性が低下しますが、未パッチ環境ではコンテナ間の境界を越える危険性があります。対策はディストリビューションのカーネルをパッチ済みバージョンへ更新すること、必要に応じてAF_ALGの無効化とセキュアモードの適用です。
  • 0
  • 1
  • 0
  • 12h ago
Profile picture fallback
「Copy Fail」CVE-2026-31431 — 9年間潜んでいた732バイトPythonでLinuxがroot化される脆弱性と対策|zephel01 https://note.com/zephel01/n/n7fa6564b43cf
  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback
Copy Fail – CVE-2026-31431 https://copy.fail/ (https://news.ycombinator.com/item?id=47952181)
  • 0
  • 0
  • 6
  • 19h ago
Profile picture fallback
Copy Fail – CVE-2026-31431 #HackerNews https://copy.fail/
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
CVE-2026-31431 https://nvd.nist.gov/vuln/detail/CVE-2026-31431 https://www.cve.org/CVERecord?id=CVE-2026-31431 >An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root. https://copy.fail/
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
🌐コピー失敗 – CVE-2026-31431 https://copy.fail/ via #HackerNews
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
A critical vulnerability, CVE-2026-31431, has been announced, allowing root access on nearly all major Linux distributions. It presents a significant security risk for systems that users can log onto.
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
コピー失敗 – CVE-2026-31431 Copy Fail – CVE-2026-31431 🔺 571 💬 57 🔗 HN Post | Article
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
Copy Fail – CVE-2026-31431 https://copy.fail/ comments #copy.fail
  • 0
  • 0
  • 1
  • 11h ago
Profile picture fallback
A 732-Byte Python Script Can Get Root on Every Major Linux Distro CVE-2026-31431 "Copy Fail": a logic bug in the Linux kernel lets any local user get root on Ubuntu, RHEL, Amazon Linux, and SUSE since 2017. Read Details- www.cyberkendra.com/2026/04/a-73... #linux #ubuntu #copyfail #security
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Copy Fail: Public PoC and Full Details Disclosed for the 732-Byte Linux Root Exploit (CVE-2026-31431) https://securityonline.info/linux-kernel-copy-fail-root-exploit-poc-public-disclosure/
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
Разработчиците на Xint Code – средство за сигурност, базирано на алгоритми с изкуствен интелект откриха в ядрото на Linux и съответно, в повечето популярни дистрибуции опасна уязвимост, която получи името Copy Fail и обозначението CVE-2026-31431...
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
❗CVE-2026-31431 „Copy Fail“: Wir haben die Schwachstelle bewertet und Schutzmaßnahmen umgesetzt. Das betroffene Kernel-Modul wurde deaktiviert und entladen, der Page Cache geleert. Kein Neustart nötig, keine geplante Downtime für Kundensysteme.
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
Copy Fail (CVE-2026-31431): The 732‑Byte Python Script That Has Owned Every Linux Since 2017 + Video Introduction: A deterministic logic flaw silently introduced into the Linux kernel in 2017 has just been publicly disclosed as “Copy Fail” (CVE-2026-31431). Attackers with access to any…
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
Wer ein Linux betreibt, auf dem viele Nutzer ein Konto haben, sollte bzgl. der #CopyFail Schwachstelle CVE-2026-31431 reagieren. borncity.com/blog/2026/04...
  • 0
  • 0
  • 1
  • 4h ago
Profile picture fallback
📢 CVE-2026-31431 ' Copy Fail ' : escalade de privilèges root en 732 octets sur toutes les distributions Linux majeures 📝 ## 🔍 … https://cyberveille.ch/posts/2026-04-30-cve-2026-31431-copy-fail-escalade-de-privileges-root-en-732-octets-sur-toutes-les-distributions-linux-majeures/ #AF_ALG #Cyberveille
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
CVE-2026-31431 (Copy Fail) detection toolkit — auditd, eBPF, Sigma, YARA
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431) 📖 Read more: www.helpnetsecurity.com/2026/04/30/c... #cybersecurity #cybersecuritynews #containers #PoC #Linux
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
~Certeu~ Unpatched 'Copy Fail' LPE flaw (CVE-2026-31431) in Linux kernel allows root access; PoC available. - IOCs: CVE-2026-31431 - #CVE202631431 #Linux #ThreatIntel
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
GitHub - iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail: Rust implementation Exploit/PoC of CVE-2026-31431-Linux-Copy-Fail, allow executing customized shellcode (such as Meterpreter).
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • cPanel
  • cPanel

29 Apr 2026
Published
30 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
16.52%

KEV

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 22 Posts
  • 66 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

An authentication bypass security issue has been identified in the cPanel software (including DNSOnly) affecting all versions after 11.40.

This one is ugly, folks. Go update your servers now, and run the detection script.

support.cpanel.net/hc/en-us/ar

#Webhosting #cPanel #WHM

  • 2
  • 1
  • 0
  • 8h ago
Profile picture fallback

🚨 CRITICAL auth bypass in cPanel & WHM (CVE-2026-41940, CVSS 9.3) lets unauthenticated attackers access the control panel. Patch not confirmed — restrict interface to trusted IPs & monitor advisories. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

En las últimas 24 horas se han detectado vulnerabilidades críticas que afectan sistemas Linux, cPanel, routers de Solana y Adobe Acrobat, exponiendo a usuarios a escalada de privilegios, suplantación de autenticación, robo de tokens y ejecución remota de código; además, se reportan fallos en Cloudflare y un malware avanzado que amenaza sectores científicos. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 30/04/26 📆 |====

🔒 COPY FAIL — 732 BYTES TO ROOT

Se ha descubierto una vulnerabilidad crítica en Linux (CVE-2026-31431) que permite escalar privilegios a nivel root sin riesgo de condiciones de carrera ni necesidad de usar offsets. Esta falla evade las herramientas de integridad de archivos en disco y afecta incluso a entornos aislados como contenedores, representando un riesgo grave para la seguridad de sistemas Linux. Detectada por Xint Code, es esencial actualizar y proteger su infraestructura cuanto antes. Descubre más sobre esta vulnerabilidad y su impacto aquí 👉 djar.co/3ckGrI

🌐 LA INTERNET ESTÁ CAYENDO, CAYENDO, CAYENDO (CVE-2026-41940 EN CPANEL Y WHM)

Una falla de suplantación de autenticación ha sido identificada en cPanel y WHM, dos herramientas clave para la gestión de hosting. Esta vulnerabilidad permite a atacantes no autenticados obtener sesiones de usuario, inclusive con privilegios de administrador root, mediante un bypass completo en la autenticación. La amenaza compromete la seguridad de miles de servidores web, por lo que se recomienda aplicar los parches disponibles de inmediato. Infórmate sobre cómo proteger tus sistemas aquí 👉 djar.co/ScQtAV

🔗 VULNERABILIDAD EN EL ROUTER DE SOLANA

Importantes fallos de seguridad han sido detectados en el enrutador de la red Solana, facilitando el drenaje de cuentas de tokens y poniendo en riesgo la integridad de las transacciones financieras dentro de esta blockchain. Estas vulnerabilidades críticas podrían comprometer fondos y confianza en la plataforma, por lo que es imprescindible que los usuarios y desarrolladores tomen medidas urgentes para mitigar estos riesgos. Detalles y recomendaciones aquí 👉 djar.co/2clAA

📄 TRES VULNERABILIDADES EN ADOBE ACROBAT QUE COMPROMETEN SEGURIDAD

Adobe ha revelado tres vulnerabilidades críticas (CVE-2026-34621, CVE-2026-34622, CVE-2026-34626) que permiten la ejecución remota de código y la filtración de información mediante archivos PDF maliciosos. Estos fallos afectan versiones populares como Acrobat DC y Reader DC, poniendo en riesgo a millones de usuarios que manejan documentos digitales. Actualizar a la última versión es fundamental para evitar intrusiones y pérdidas de datos. Conoce los detalles y actualizaciones disponibles aquí 👉 djar.co/Rvvu5

🏛️ LA ESTRATEGIA DEL CONGRESO CONTRA BLOQUEOS MASIVOS DE IP POR LALIGA

El Congreso ha aprobado una reforma a la Ley de Servicios Digitales para evitar bloqueos masivos de direcciones IP que afecten a páginas ajenas en procesos contra la piratería, buscando un equilibrio entre la protección de derechos y la seguridad en internet. Esta medida evita que resoluciones judiciales derriben sitios web de terceros y promueve un entorno digital más seguro y regulado. Entiende el alcance y las implicaciones de esta reforma aquí 👉 djar.co/8dbV

☁️ VULNERABILIDADES CRÍTICAS EN LA IMPLEMENTACIÓN DE CLOUDFLARE

Se han reportado vulnerabilidades en los proxies de autorización y archivos PAC alojados por Cloudflare que afectan la gestión de políticas de seguridad de identidad sin necesidad de clientes en dispositivos finales. Estas fallas, aunque técnicas, representan un avance en cómo se protegen las redes y requieren atención para evitar posibles explotaciones. Mantente informado sobre cómo estas vulnerabilidades impactan la seguridad del entorno web aquí 👉 djar.co/Y6uR

🐛 DETECTANDO LA AMENAZA DEL MALWARE FAST16

Un malware avanzado, posiblemente desarrollado o patrocinado por un estado, ha sido identificado causando sabotajes discretos mediante la manipulación de programas matemáticos y simulaciones físicas. Esta amenaza tiene potencial para generar fallos graves, afectando sectores científicos y tecnológicos sensibles. La detección y respuesta temprana son claves para mitigar el daño. Aprende cómo proteger tus sistemas frente a Fast16 aquí 👉 djar.co/CN8X

  • 1
  • 1
  • 0
  • 2h ago

Bluesky

Profile picture fallback
The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts since late February.
  • 5
  • 2
  • 0
  • 2h ago
Profile picture fallback
The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940) - watchTowr Labs
  • 0
  • 0
  • 6
  • 20h ago
Profile picture fallback
CVE-2026-41940: CRITICAL cPanel & WHM Zero-Day Authentication Bypass—Patch Now or Get Hacked! + Video Introduction A newly disclosed pre-authentication bypass vulnerability tracked as CVE-2026-41940 affects every supported version of cPanel & WHM—the control plane software managing an estimated 70…
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
🚨 On 4/28/26, #cPanel issued a security update to fix a critical vuln. affecting its WHM and WP Squared products. With a CVSS score of 9.8, CVE-2026-41940 allows unauth. remote attackers to bypass authentication & gain administrative access to systems: r-7.co/4vZ0vgX
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
実環境での悪用事例:cPanelのCVE-2026-41940認証バイパスのゼロデイ脆弱性に関する概念実証(PoC)が公開されました Exploited in the Wild: PoC Released for cPanel CVE-2026-41940 Authentication Bypass Zero-Day #DailyCyberSecurity (Apr 29) securityonline.info/cpanel-authe...
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
A critical vulnerability (CVE-2026-41940) in cPanel & WHM's authentication mechanism poses a severe risk to internet infrastructure, allowing unauthorized access. Discovered by watchTowr Labs, this exploit could lead to widespread disruption if not addressed promptly.
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Critical cPanel Flaw Lets Attackers Bypass Login, Patch Urgently A critical security vulnerability tracked as CVE-2026-41940 has been discovered in most versions of cPanel and WebHost Manager (WHM), potentially allowing attackers to access hosting control panels without authentication.
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
Our software is a mix and match of 3rd parties, tools, and services that continue to expand the attack surface. If you need an example, CVE-2026-41940 was recently identified as a critical authentication bypass in cPanel & WHM (and WP Squared), with a CVSS score of 9.8.
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
‼️CVE-2026-41940: cPanel & WHM Authentication Bypass (CVSS 9.8 Critical)  A critical authentication bypass has been discovered in cPanel & WHM. Modat Magnify Query:  (technology="cPanel" or web.html~"/cPanel_magic_revision_" or web.headers~"whostmgrrelogin") and tag!=honeypot
  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback
cPanel zero-day exploited for months before patch release (CVE-2026-41940) 📖 Read more: www.helpnetsecurity.com/2026/04/30/c... #cybersecurity #cybersecuritynews #0day #cPanel #securityupdate #webhosting @labs.watchtowr.com.web.brid.gy @rapid7.com
  • 0
  • 0
  • 0
  • Last hour

Overview

  • GitHub
  • Enterprise Server

10 Mar 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.35%

KEV

Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.

Statistics

  • 11 Posts
  • 86 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

With Microsoft pushing AI slop & bots hard into every product without any verification and accountability I am not surprised bug like this now exists. Critical GitHub RCE bug exposed millions of repositories including private one that business users like to keep their code private. GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance nvd.nist.gov/vuln/detail/CVE-2

  • 41
  • 42
  • 0
  • 23h ago
Profile picture fallback

@ben @jpmens Yes,; executing commands with parameters given by the user, without any escaping. wiz.io/blog/github-rce-vulnera

  • 1
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
研究者らが、単一のGitプッシュで悪用可能なGitHubの重大なRCE脆弱性CVE-2026-3854を発見 Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push #HackerNews (Apr 28) thehackernews.com/2026/04/rese...
  • 0
  • 1
  • 0
  • 13h ago
Profile picture fallback
88% of self-hosted GitHub servers exposed to RCE, researchers warn (CVE-2026-3854) 🔗 Read more: www.helpnetsecurity.com/2026/04/29/c... #GitHub #vulnerability #cybersecurity
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
Advierten que el 88% de los servidores GitHub autohospedados están expuestos a la ejecución remota de código (CVE-2026-3854). La versión en la nube ya está parchada, pero si usas la versión Enterprise Server, ¡debes actualizar de inmediato a las versiones corregidas www.linkedin.com/pulse/invest...
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
GitHub fixed a critical RCE flaw (CVE-2026-3854) allowing attackers to access millions of private repos via a malicious git push. GitHub.com patched it fast, but many Enterprise Servers remain at risk and need urgent updates. #CVE20263854 #GitHub
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
研究者らは、自己ホスト型のGitHubサーバーの88%がリモートコード実行(RCE)の脆弱性にさらされていると警告している(CVE-2026-3854) 88% of self-hosted GitHub servers exposed to RCE, researchers warn (CVE-2026-3854) #HelpNetSecurity (Apr 29) www.helpnetsecurity.com/2026/04/29/c...
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
GitHub fixed CVE-2026-3854, a critical RCE flaw in both cloud and GitHub Enterprise Server. Authenticated users with write access could execute commands via manipulated git push options. #GitHubSecurity #RCEVulnerability #EnterpriseServer
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
GitHub yesterday disclosed CVE-2026-3854, a high severity (8.7 CVSS) vulnerability identified in GitHub Enterprise Server that would grant an attacker with push access to a repository to achieve remote code execution.
  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: (CVE-2026-3854) #GitHub Enterprise Server RCE via Git Push Injection" and "Emerging Threat: (CVE-2026-40372) ASP.NET Core Privilege Escalation via Signature Bypass". #cybersecurity #AttackSurfaceManagement https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 7 Posts
  • 3 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

LiteLLM-Sicherheitslücke CVE-2026-42208: SQL-Injection binnen 36 Stunden nach Veröffentlichung aktiv ausgenutzt

all-about-security.de/litellm-

#llm #cve #cybersecurity

  • 1
  • 1
  • 0
  • 8h ago
Profile picture fallback

This is the issue with AI in criminal hands. Speed to market.

thehackernews.com/2026/04/lite

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture fallback
A critical SQL injection (CVE-2026-42208) in LiteLLM was exploited days after disclosure, exposing API keys and credentials. Patch 1.83.7 fixes the flaw by parameterizing key verification queries. #LiteLLM #SQLInjection #OpenSource
  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
CVE-2026-42208:LiteLLMのバグが、公開から36時間後に悪用される CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure #SecurityAffairs (Apr 29) securityaffairs.com/191483/hacki...
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
LiteLLM-Sicherheitslücke CVE-2026-42208: SQL-Injection binnen 36 Stunden nach Veröffentlichung aktiv ausgenutzt www.all-about-security.de/litellm-sich... #cve #llm #cybersecurity #itsecurity #itsicherheit
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure reconbee.com/litellm-cve-... #LiteLLM #LLM #sqlinjection #SQL #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
29 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
7.19%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 13 hours ago

Bluesky

Profile picture fallback
CISAとマイクロソフトは、Windowsシェル脆弱性(CVE-2026-32202)の悪用が活発に行われていると警告した CISA, Microsoft warn of active exploitation of Windows Shell vulnerability (CVE-2026-32202) #HelpNetSecurity (Apr 29) www.helpnetsecurity.com/2026/04/29/w...
  • 0
  • 1
  • 0
  • 13h ago
Profile picture fallback
📢 CVE-2026-32202 : faille Windows Shell activement exploitée, liée à APT28 📝 ## 🗓️ Contexte Publié le 28 avril 2026 par The Cyber Security Hub sur LinkedIn, cet article… https://cyberveille.ch/posts/2026-04-29-cve-2026-32202-faille-windows-shell-activement-exploitee-liee-a-apt28/ #APT28 #Cyberveille
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
Attackers exploit a zero-click Windows flaw, CVE-2026-32202, exposing sensitive information on vulnerable systems.
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
CISAが既知の悪用された脆弱性2件をカタログに追加 CISA Adds Two Known Exploited Vulnerabilities to Catalog #CISA (Apr 28) CVE-2024-1708 ConnectWise ScreenConnect パストラバーサル脆弱性 CVE-2026-32202 Microsoft Windows保護メカニズムの不具合の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • SGLang
  • SGLang

20 Apr 2026
Published
29 Apr 2026
Updated

CVSS
Pending
EPSS
0.32%

KEV

Description

SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture fallback

CERT/CC issued advisory VU#915947 for SGLang (an AI inference server), CVE-2026-5760, severity 9.8. A poisoned GGUF model file carries a chat-template that SGLang renders through Jinja2 with no sandbox. Arbitrary Python runs on the host. Same root cause as llama-cpp-python (2024) and vLLM (2025). Sandboxed Jinja2 existed the whole time and three frameworks left the line untouched. Any GGUF you did not build yourself runs code on load.

#AI #InfoSec #CyberSecurity #OpenSource #LLM

  • 1
  • 1
  • 0
  • 23h ago

Overview

  • TUBITAK BILGEM Software Technologies Research Institute
  • Pardus Software Center

29 Apr 2026
Published
29 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
0.03%

KEV

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center allows Path Traversal. This issue affects Pardus Software Center: before 1.0.3.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🚩 CRITICAL: CVE-2026-5166 in Pardus Software Center <1.0.3 enables path traversal — attackers may access/modify files outside restricted dirs. No patch yet. Restrict access, monitor updates. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 10h ago

Overview

  • thymeleaf
  • thymeleaf

17 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.05%

KEV

Description

Thymeleaf is a server-side Java template engine for web and standalone environments. Versions 3.1.3.RELEASE and prior contain a security bypass vulnerability in the the expression execution mechanisms. Although the library provides mechanisms to prevent expression injection, it fails to properly neutralize specific syntax patterns that allow for the execution of unauthorized expressions. If an application developer passes unvalidated user input directly to the template engine, an unauthenticated remote attacker can bypass the library's protections to achieve Server-Side Template Injection (SSTI). This issue has ben fixed in version 3.1.4.RELEASE.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 12 hours ago

Bluesky

Profile picture fallback
The latest update for #Snyk includes "'A Mini Shai-Hulud Has Appeared': Bun-Based Stealer Hits #SAP @cap-js and mbt npm Packages" and "Don't Panic: The Thymeleaf Template Injection That Only Hurts If You Let It (CVE-2026-40478)". #CyberSecurity #DevOps #OpenSource https://opsmtrs.com/3yzKsZo
  • 0
  • 3
  • 0
  • 12h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
30 Apr 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago

Fediverse

Profile picture fallback

RE: mastodon.bsd.cafe/@grahamperri

3/

CVE-2026-7270 <cve.org/CVERecord?id=CVE-2026-> FreeBSD-SA-26:13.exec <security.freebsd.org/advisorie> credited to Ryan of Calif.io.

Calif is recently known for post-CVE attention to an earlier CVE, <blog.calif.io/p/mad-bugs-claud>. This work by Calif was wrongly attributed to Nicholas Carlini (an error by Devansh in 'Artificial Intelligence Made Simple').

  • 0
  • 1
  • 0
  • 9h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
30 Apr 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

When processing the header of an incoming message, libnv failed to properly validate the message size. The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago
Showing 1 to 10 of 45 CVEs