24h | 7d | 30d

Overview

  • Linux
  • Linux

08 May 2026
Published
08 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 24 Posts
  • 260 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

lwn.net/Articles/1071719/

#DirtyFrag is a broken embargo.

Local Privilege Escalation to root.

Public working exploit. No CVE assigned yet.

No fix in sight.
<edit> 7.0.5 was just released which has a fix </edit>
<edit 2> CVE-2026-43284 has been assigned</edit 2>

#infosec #cyber #tsunamiofvulns #CVE-2026-43284

This is the documentation & exploit of DirtyFrag:
github.com/V4bel/dirtyfrag/blo

  • 27
  • 18
  • 0
  • 23h ago
Profile picture fallback

2 new vulnerabilities similar to copyfail:

- CVE-2026-43284 (Dirty Frag)
- CVE-2026-43500

github.com/V4bel/dirtyfrag

We're waiting for a release containing the last one before pushing new kernels to aports.

github.com/V4bel/dirtyfrag#mit mentions a mitigation in the meantime.

  • 34
  • 24
  • 0
  • 10h ago
Profile picture fallback

Just got a kernel update from Debian 13's security channel, which fixes both CVE-2026-43284 and CVE-2026-43500, aka "Dirty Frag".

Debian 12 is not yet patched.

Tracker Links:
security-tracker.debian.org/tr
security-tracker.debian.org/tr

#DirtyFrag #Debian #Linux #Kernel #InfoSec

  • 16
  • 21
  • 0
  • 4h ago
Profile picture fallback

CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations.

Quickfix for Centos/Fedora based systems:

printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf && rmmod esp4 esp6 rxrpc 2>/dev/null; true

Caution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives.

#dirtyfrag #cve_2026_43284 #security #centos #fedora #redhat

  • 3
  • 4
  • 0
  • 1h ago
Profile picture fallback

L'ensemble de notre parc infogéré est immunisé contre la faille Dirty Frag (CVE-2026-43284) depuis ce matin 08h59.

En gros, c'est l'enfant maudit de Dirty Pipe et Copy Fail qui permet une élévation locale de privilèges qui fonctionne très bien.

En savoir plus sur la faille-> github.com/V4bel/dirtyfrag#dir

  • 3
  • 2
  • 0
  • 14h ago
Profile picture fallback
Happy Frid^WCVE-2026-43284

#Linux #DirtyFrag #CopyFail
  • 1
  • 0
  • 0
  • 14h ago
Profile picture fallback

OhMyDebn 3.7.1 now available with mitigation for Dirty Frag local privilege escalation (CVE-2026-43284)

OhMyDebn is a debonair Linux desktop for power users. It gives you the stability of the Debian distro, the ease of use of the Cinnamon desktop, and the power of AI, containers, and virtualization.

  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback

[related]
chez AlmaLinux

"Dirty Frag (CVE-2026-43284) vulnerability fix is ready for testing"
👇
almalinux.org/blog/2026-05-07-

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

Nouveaux kernels stables : 7.0.5 / 6.18.28 / 6.12.87 / 6.6.138

Ils embarquent un fix partiel pour (CVE-2026-43284) et Copy Fail 2.

Partiel, car Greg Kroah-Hartman a confirmé qu'un second patch est encore en développement et n'a pas encore été mergé.

La mitigation par blacklist des modules reste donc recommandée en attendant.
👇
lwn.net/Articles/1071775/

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

📰 Critical Unpatched 'Dirty Frag' Linux Zero-Day Allows Instant Root Access

🚨 CRITICAL ZERO-DAY: 'Dirty Frag' (CVE-2026-43284) vulnerability in Linux kernel disclosed with NO PATCH. Allows immediate root privilege escalation. Flaw has existed for 9 years. Admins must seek mitigations now! 🐧🔥 #Linux #ZeroDay #CyberSecurity

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback

Ok Ive been working through the mitigations for the string of kernel vulnerabilities. I think this is all of them. I had Claude spit out a summary.

Hope this helps others.

NOTE: I have edited this post to better outline the fixes and improve terminology. Plus we've got a CVE designation for dirty frag now.

## Linux Kernel LPE Roundup — May 8, 2026

Four local privilege escalation vulnerabilities in the same bug class (page-cache writes) are actively circulating. Here's what you need to know:

### 1. Copy Fail (CVE-2026-31431)

Original page-cache write via algif_aead in the crypto subsystem. Patched upstream, distro patches available.

Mitigation: Apply your distro's kernel update, or prevent the module from loading:

echo 'install algif_aead /bin/false' > /etc/modprobe.d/copyfail.conf

copy.fail/

### 2. Dirty Frag (CVE-2026-43284)

Chains xfrm-ESP + RxRPC page-cache writes for a universal unprivileged LPE across all major distros. Published after a third party broke the embargo — no patches exist yet.

Mitigation: Prevent the modules from loading:

printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf

Then unload them if currently loaded:

rmmod esp4 esp6 rxrpc 2>/dev/null

github.com/V4bel/dirtyfrag/

### 3. Copy Fail 2: Electric Boogaloo (no CVE yet)

xfrm ESP-in-UDP variant using MSG_SPLICE_PAGES. Same class as Copy Fail, different subsystem. Autoloads esp4/xfrm modules via userns netlink. Upstream fix committed but not yet in stable branches.

Mitigation: Same esp4 modprobe override as Dirty Frag covers this.

github.com/0xdeadbeefnetwork/C

### 4. io_uring ZCRX Freelist LPE (no CVE yet)

Out-of-bounds write in io_uring's zero-copy receive freelist. Narrower scope — requires kernel 6.15+, CONFIG_IO_URING_ZCRX=y, a supported NIC (mlx5/ice/nfp), and CAP_NET_ADMIN. Fix committed but not in stable yet.

Mitigation: Check if you're affected:

grep CONFIG_IO_URING_ZCRX /lib/modules/$(uname -r)/config

No output or "is not set" means you're not vulnerable.

ze3tar.github.io/post-zcrx.html

### Note

If any of these modules are built into your kernel (=y rather than =m), the modprobe approach won't work — you'll need initcall_blacklist= on the kernel command line instead. Check with:

grep -E 'CONFIG_INET_ESP=|CONFIG_INET6_ESP=|CONFIG_AF_RXRPC=|CONFIG_CRYPTO_USER_API_AEAD=' /lib/modules/$(uname -r)/config

#linux #kernel #cve #vulnerability #copyfail #copyfail2 #dirtyfrag #security #infosec #sysadmin

  • 5
  • 2
  • 0
  • 20h ago
Profile picture fallback

@jschauma About istheinternetonfire.com/ DirtyFrag now has one CVE (two, actually) CVE-2026-43284 and CVE-2026-43500

  • 2
  • 2
  • 0
  • 9h ago
Profile picture fallback

As I haven't seen this in my timeline yet:
There is another #Linux #zeroday privilege escalation #vulnerability.
No, not copy_fail, a new one, called DirtyFrag, combining CVE-2026-43284 and CVE-2026-43500

Apparently the finder was gonna disclose this responsibly, but they claim the embargo was broken by a third party.

Most probably not patched yet in distros, but fix (at least for one of the CVEs) is in mainline.

github.com/V4bel/dirtyfrag

A workaround/mitigation exists: github.com/V4bel/dirtyfrag#mit

  • 1
  • 3
  • 0
  • 7h ago
Profile picture fallback

Les deux vulnérabilités composant ont reçu leurs numéros CVE :

🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write

Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
vulnerability.circl.lu/vuln/CV

  • 1
  • 0
  • 0
  • 12h ago
Profile picture fallback
[ Linux KernelのLPE(Local Privilege Escalation)脆弱性(Dirty Frag: CVE-2026-43284, CVE-2026-43500) - SIOS SECURITY BLOG ]
https://security.sios.jp/vulnerability/kernel-security-vulnerability-20260508/
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

Did you update your Linux kernel again to protect against the last privilege escalation bug?

No, not CopyFail (CVE-2026-31431), the new DirtyFrag (CVE-2026-43284, CVE-2026-43500).

  • 1
  • 2
  • 0
  • 2h ago

Bluesky

Profile picture fallback
CVE-2026-43284がアサインされた模様です。 www.cve.org/CVERecord?id...
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
A newly disclosed Linux local privilege escalation vulnerability known as “Dirty Frag” enables escalation from an unprivileged user to root through vulnerable kernel networking & memory-fragment handling components, including esp4, esp6 (CVE-2026-43284), and rxrpc (CVE-2026-43500). msft.it/6015v3WNc
  • 3
  • 5
  • 0
  • 4h ago
Profile picture fallback
📢 Dirty Frag : deux vulnérabilités Linux permettent l'élévation de privilèges root (CVE-2026-43284 / CVE-2026-43500) 📝 #… https://cyberveille.ch/posts/2026-05-08-dirty-frag-deux-vulnerabilites-linux-permettent-l-elevation-de-privileges-root-cve-2026-43284-cve-2026-43500/ #CVE_2026_43284 #Cyberveille
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
"Dirty Frag" Linux Kernel LPE Zero-Day (CVE-2026-43284, CVE-2026-43500) #patchmanagement
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
~Cybergcca~ Alert on unpatched Linux LPE flaws (Dirty Frag) with active PoCs, plus Edge & cPanel updates. - IOCs: CVE-2026-43284, CVE-2026-43500 - #Linux #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
DirtyFrag exploits two Linux kernel bugs, CVE-2026-43284 and CVE-2026-43500, enabling local root access on major distros including Ubuntu, RHEL, Fedora, CentOS Stream, AlmaLinux, and openSUSE. #LinuxRoot #KernelExploit #USA
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 16 Posts
  • 203 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

2 new vulnerabilities similar to copyfail:

- CVE-2026-43284 (Dirty Frag)
- CVE-2026-43500

github.com/V4bel/dirtyfrag

We're waiting for a release containing the last one before pushing new kernels to aports.

github.com/V4bel/dirtyfrag#mit mentions a mitigation in the meantime.

  • 34
  • 24
  • 0
  • 10h ago
Profile picture fallback

and we have another one. This one with CVE.

#dirtyfrag #CVE-2026-43500

  • 5
  • 4
  • 0
  • 7h ago
Profile picture fallback

Just got a kernel update from Debian 13's security channel, which fixes both CVE-2026-43284 and CVE-2026-43500, aka "Dirty Frag".

Debian 12 is not yet patched.

Tracker Links:
security-tracker.debian.org/tr
security-tracker.debian.org/tr

#DirtyFrag #Debian #Linux #Kernel #InfoSec

  • 16
  • 21
  • 0
  • 4h ago
Profile picture fallback

Why wait for the slow UEFI when you can just `systemctl kexec` to remediate Dirty Frag with (almost) sub- 1 Minute downtime (2nd reboot for CVE-2026-43500 follows)
(all VMs except the pinned ones have been migrated off before)

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback

@jschauma About istheinternetonfire.com/ DirtyFrag now has one CVE (two, actually) CVE-2026-43284 and CVE-2026-43500

  • 2
  • 2
  • 0
  • 9h ago
Profile picture fallback

As I haven't seen this in my timeline yet:
There is another #Linux #zeroday privilege escalation #vulnerability.
No, not copy_fail, a new one, called DirtyFrag, combining CVE-2026-43284 and CVE-2026-43500

Apparently the finder was gonna disclose this responsibly, but they claim the embargo was broken by a third party.

Most probably not patched yet in distros, but fix (at least for one of the CVEs) is in mainline.

github.com/V4bel/dirtyfrag

A workaround/mitigation exists: github.com/V4bel/dirtyfrag#mit

  • 1
  • 3
  • 0
  • 7h ago
Profile picture fallback

Les deux vulnérabilités composant ont reçu leurs numéros CVE :

🔴 CVE-2026-43284 — xfrm-ESP Page-Cache Write (patché en mainline : f4c50a4034e6)
🟡 CVE-2026-43500 — RxRPC Page-Cache Write

Si ce n'est pas encore fait, la mitigation reste de blacklister esp4, esp6 et rxrpc.
👇
vulnerability.circl.lu/vuln/CV

  • 1
  • 0
  • 0
  • 12h ago
Profile picture fallback
[ Linux KernelのLPE(Local Privilege Escalation)脆弱性(Dirty Frag: CVE-2026-43284, CVE-2026-43500) - SIOS SECURITY BLOG ]
https://security.sios.jp/vulnerability/kernel-security-vulnerability-20260508/
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

Did you update your Linux kernel again to protect against the last privilege escalation bug?

No, not CopyFail (CVE-2026-31431), the new DirtyFrag (CVE-2026-43284, CVE-2026-43500).

  • 1
  • 2
  • 0
  • 2h ago

Bluesky

Profile picture fallback
CVE-2026-43500も追加でアサインされるそうです(まだCVE自体は公開されていません)
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
A newly disclosed Linux local privilege escalation vulnerability known as “Dirty Frag” enables escalation from an unprivileged user to root through vulnerable kernel networking & memory-fragment handling components, including esp4, esp6 (CVE-2026-43284), and rxrpc (CVE-2026-43500). msft.it/6015v3WNc
  • 3
  • 5
  • 0
  • 4h ago
Profile picture fallback
📢 Dirty Frag : deux vulnérabilités Linux permettent l'élévation de privilèges root (CVE-2026-43284 / CVE-2026-43500) 📝 #… https://cyberveille.ch/posts/2026-05-08-dirty-frag-deux-vulnerabilites-linux-permettent-l-elevation-de-privileges-root-cve-2026-43284-cve-2026-43500/ #CVE_2026_43284 #Cyberveille
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
"Dirty Frag" Linux Kernel LPE Zero-Day (CVE-2026-43284, CVE-2026-43500) #patchmanagement
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
~Cybergcca~ Alert on unpatched Linux LPE flaws (Dirty Frag) with active PoCs, plus Edge & cPanel updates. - IOCs: CVE-2026-43284, CVE-2026-43500 - #Linux #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
DirtyFrag exploits two Linux kernel bugs, CVE-2026-43284 and CVE-2026-43500, enabling local root access on major distros including Ubuntu, RHEL, Fedora, CentOS Stream, AlmaLinux, and openSUSE. #LinuxRoot #KernelExploit #USA
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

07 May 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
5.01%

Description

An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.

Statistics

  • 19 Posts
  • 6 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

New Ivanti EPMM Zero-Day CVE-2026-6973 Actively Exploited — Patch Immediately
#CyberSecurity
securebulletin.com/new-ivanti-

  • 4
  • 0
  • 0
  • 13h ago
Profile picture fallback

🚨 Ivanti Endpoint Manager Mobile flaw (CVE-2026-6973) is being exploited in limited attacks, enabling remote code execution with admin access.

CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.

Read: thehackernews.com/2026/05/ivan

  • 0
  • 1
  • 0
  • 14h ago
Profile picture fallback

CISA KEV update May 7: CVE-2026-6973 Ivanti EPMM added. Actively exploited input validation flaw. Federal deadline applies, everyone else should patch. - cisa.gov/news-events/alerts/20

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

Tracked as CVE-2026-6973, this security flaw allows attackers with administrative privileges to execute arbitrary code remotely on systems running EPMM 12.8.0.0 and earlier. bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • 9h ago

Bluesky

Profile picture fallback
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973) www.helpnetsecurity.com/2026/05/08/i...
  • 0
  • 1
  • 0
  • 8h ago
Profile picture fallback
A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution. The U.S. Cybersecurity […]
  • 0
  • 0
  • 1
  • 23h ago
Profile picture fallback
Ivanti EPMMのCVE-2026-6973 RCE脆弱性が実際に悪用され、管理者レベルのアクセス権が付与される Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access #HackerNews (May 7) thehackernews.com/2026/05/ivan...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (May 7) CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) の不適切な入力検証の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
Ivanti reveals CVE-2026-6973, a critical remote code execution flaw in Endpoint Manager Mobile 12.8.0.0 and earlier, exploited in limited zero-day attacks. Additional patches released, admins urged to review credentials. #Ivanti #ZeroDay #USA
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access reconbee.com/ivanti-epmm-... #Ivanti #EPMM #adminlevelaccess #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Ivanti released patches for five vulnerabilities in Endpoint Manager Mobile, including CVE-2026-6973, a zero-day exploited in targeted attacks allowing remote code execution by authenticated admins. #IvantiPatch #ZeroDay #USA
  • 0
  • 0
  • 1
  • 14h ago
Profile picture fallback
Ivanti EPMM vulnerability exploited in zero-day attacks (CVE-2026-6973) 📖 Read more: www.helpnetsecurity.com/2026/05/08/i... #cybersecurity #cybersecuritynews #0day #endpointmanagement #vulnerability
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Ivanti: We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication.
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Ivanti、ゼロデイに悪用可能な欠陥含むEPMMの脆弱性を複数修正(CVE-2026-6973、CVE-2026-7821他) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45488/
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

06 May 2026
Published
07 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
4.65%

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Statistics

  • 10 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vulnerability in the User-ID Authentication Portal service of Palo Alto Networks PAN-OS software that could allow an unauthenticated attacker to execute arbitrary code with root privileges by sending specially crafted packets. thehackernews.com/2026/05/pan-

  • 0
  • 0
  • 1
  • 10h ago
Profile picture fallback

📰 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE

🚨 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
CVE-2026-0300: UNPATCHED PAN-OS ZERO-DAY UNDER ACTIVE EXPLOITATION—SECURE YOUR FIREWALLS NOW Introduction: A critical, unpatched buffer overflow vulnerability (CVE-2026-0300, CVSS 9.3) is being actively exploited in the wild against Palo Alto Networks PA-Series and VM-Series firewalls when the…
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
The latest update for #ArcticWolf includes "CVE-2026-0300 — Critical Buffer Overflow in PAN-OS User-ID Authentication Portal" and "Should Your Organization Rely on #XDR For #Cybersecurity?". #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
The latest update for #Foresiet includes "CVE-2026-0300: Unauthenticated Root RCE via Buffer Overflow in Palo Alto PAN-OS User-ID Authentication Portal" and "The April 2026 #AI Security Report: 6 Incidents and Detailed Attack Paths". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
⚠️ Une faille critique dans #PaloAlto PAN-OS (CVE-2026-0300) permet une exécution de code à distance sans authentification. Exploitation active détectée sur le terrain. Score CVSS : 9.3. #CyberSecurity #Automatisation
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
Palo Alto Networks reveals active exploitation of zero-day CVE-2026-0300 in PA and VM firewalls, enabling unauthenticated root access. Attack linked to Chinese state group CL-STA-1132 using Earthworm and ReverseSocks5. #China #PaloAlto #ZeroDay
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
【脆弱性】CVE-2026-0300とは?Palo Alto Networks製PAN-OSの重大脆弱性と企業が取るべき対策を解説 2026年5月、Palo Alto NetworksのファイアウォールOS「PAN-OS」に関する重大な脆弱性「CVE-2026-0300」が公表されました。この脆弱性は、条件を満たす機器に対して外部から攻撃されるおそれがあり、すでに実際の悪用も確認されています。
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
📢 Exploitation active de CVE-2026-0300 : RCE critique dans PAN-OS par un acteur étatique 📝 ## 🗓️ Contexte Publié le 8 mai 2026 par Truesec, cet art… https://cyberveille.ch/posts/2026-05-08-exploitation-active-de-cve-2026-0300-rce-critique-dans-pan-os-par-un-acteur-etatique/ #CL_STA_1132 #Cyberveille
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Linux
  • Linux

22 Apr 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.91%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 6 Posts
  • 39 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

⚠️ PSA: patch your AlmaLinux systems.

Copy Fail lets any local user escalate to root. We shipped fixes for AL 8, 9 & 10 ahead of upstream—they're in production now. almalinux.org/blog/2026-05-01-

  • 13
  • 11
  • 1
  • 6h ago
Profile picture fallback

variante peu sympa 👀
"Unprivileged Linux LPE via xfrm ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path. Page-cache write into any readable file. Overwrites a nologin line in /etc/passwd with sick::0:0:...:/:/bin/bash and sus into it. Same class as Copy Fail (CVE-2026-31431), different subsystem."
⬇️
github.com/0xdeadbeefnetwork/C

  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback

Ok Ive been working through the mitigations for the string of kernel vulnerabilities. I think this is all of them. I had Claude spit out a summary.

Hope this helps others.

NOTE: I have edited this post to better outline the fixes and improve terminology. Plus we've got a CVE designation for dirty frag now.

## Linux Kernel LPE Roundup — May 8, 2026

Four local privilege escalation vulnerabilities in the same bug class (page-cache writes) are actively circulating. Here's what you need to know:

### 1. Copy Fail (CVE-2026-31431)

Original page-cache write via algif_aead in the crypto subsystem. Patched upstream, distro patches available.

Mitigation: Apply your distro's kernel update, or prevent the module from loading:

echo 'install algif_aead /bin/false' > /etc/modprobe.d/copyfail.conf

copy.fail/

### 2. Dirty Frag (CVE-2026-43284)

Chains xfrm-ESP + RxRPC page-cache writes for a universal unprivileged LPE across all major distros. Published after a third party broke the embargo — no patches exist yet.

Mitigation: Prevent the modules from loading:

printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf

Then unload them if currently loaded:

rmmod esp4 esp6 rxrpc 2>/dev/null

github.com/V4bel/dirtyfrag/

### 3. Copy Fail 2: Electric Boogaloo (no CVE yet)

xfrm ESP-in-UDP variant using MSG_SPLICE_PAGES. Same class as Copy Fail, different subsystem. Autoloads esp4/xfrm modules via userns netlink. Upstream fix committed but not yet in stable branches.

Mitigation: Same esp4 modprobe override as Dirty Frag covers this.

github.com/0xdeadbeefnetwork/C

### 4. io_uring ZCRX Freelist LPE (no CVE yet)

Out-of-bounds write in io_uring's zero-copy receive freelist. Narrower scope — requires kernel 6.15+, CONFIG_IO_URING_ZCRX=y, a supported NIC (mlx5/ice/nfp), and CAP_NET_ADMIN. Fix committed but not in stable yet.

Mitigation: Check if you're affected:

grep CONFIG_IO_URING_ZCRX /lib/modules/$(uname -r)/config

No output or "is not set" means you're not vulnerable.

ze3tar.github.io/post-zcrx.html

### Note

If any of these modules are built into your kernel (=y rather than =m), the modprobe approach won't work — you'll need initcall_blacklist= on the kernel command line instead. Check with:

grep -E 'CONFIG_INET_ESP=|CONFIG_INET6_ESP=|CONFIG_AF_RXRPC=|CONFIG_CRYPTO_USER_API_AEAD=' /lib/modules/$(uname -r)/config

#linux #kernel #cve #vulnerability #copyfail #copyfail2 #dirtyfrag #security #infosec #sysadmin

  • 5
  • 2
  • 0
  • 20h ago
Profile picture fallback

Did you update your Linux kernel again to protect against the last privilege escalation bug?

No, not CopyFail (CVE-2026-31431), the new DirtyFrag (CVE-2026-43284, CVE-2026-43500).

  • 1
  • 2
  • 0
  • 2h ago

Bluesky

Profile picture fallback
Similar to the previously disclosed Copy Fail vulnerability (CVE-2026-31431), the exploit attempts to manipulate Linux page cache behavior to achieve privilege escalation. However, Dirty Frag introduces additional attack paths that expand exploitation opportunities and improve reliability.
  • 0
  • 5
  • 0
  • 4h ago

Overview

  • xz
  • xz

29 Mar 2024
Published
20 Nov 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
85.06%

KEV

Description

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 9 hours ago

Bluesky

Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 | Discussion
  • 1
  • 1
  • 0
  • 20h ago
Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 github.com/robertdfrenc... (news.ycombinator.com/item?id=4805...)
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 https://github.com/robertdfrench/ifuncd-up https://news.ycombinator.com/item?id=48056749
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Microsoft
  • Azure DevOps

07 May 2026
Published
08 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.09%

KEV

Description

Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized attacker to disclose information over a network.

Statistics

  • 2 Posts
  • 22 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

Oh, neat, the daily MS CVSS 10 :apartyblobcat:

nvd.nist.gov/vuln/detail/cve-2

  • 8
  • 13
  • 0
  • 6h ago
Profile picture fallback

🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 19h ago

Overview

  • Google
  • Android

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

In adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentication due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution as the shell user with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 3 Posts
  • 28 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

CVE-2026-0073 is a Critical severity Remote Code Execution (RCE) vulnerability included as the only vulnerability fixed in the May 2026 Android Security Bulletin. GrapheneOS first shipped the patch in our 2026030501 security preview release on March 5th. It also isn't nearly as severe as it sounds.

  • 6
  • 22
  • 1
  • 21h ago

Bluesky

Profile picture fallback
📢 CVE-2026-0073 : Bypass d'authentification critique dans ADB-over-TCP d'Android permettant une RCE 📝 ## 🔍 Contexte Publié le 5 mai 2026 par BA… https://cyberveille.ch/posts/2026-05-08-cve-2026-0073-bypass-d-authentification-critique-dans-adb-over-tcp-d-android-permettant-une-rce/ #ADB #Cyberveille
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.

Statistics

  • 1 Post
  • 27 Interactions

Last activity: 16 hours ago

Bluesky

Profile picture fallback
CVE-2026-7270: root on FreeBSD with a shell script :( blog.calif.io/p/cve-2026-7...
  • 13
  • 14
  • 0
  • 16h ago

Overview

  • BerriAI
  • litellm

08 May 2026
Published
08 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.08%

Description

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorised access to the proxy and the credentials it manages. This issue has been patched in version 1.83.7.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-42208 in BerriAI LiteLLM (v1.81.16 – 1.83.6) enables unauthenticated SQL injection via API key processing. Patch to v1.83.7 immediately to protect credentials and data. Details: radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
~Cisa~ CISA added CVE-2026-42208, an actively exploited BerriAI LiteLLM SQL injection flaw, to its KEV catalog. - IOCs: CVE-2026-42208 - #CISA #CVE202642208 #ThreatIntel
  • 0
  • 0
  • 0
  • 2h ago
Showing 1 to 10 of 75 CVEs