Overview
Description
Statistics
- 16 Posts
- 19 Interactions
Fediverse
Sobre la vulnerabilidad del Kernel (CVE-2026-31431) conocida con el nombre #CopyFail (más información: https://copy.fail)
Comentaros que ya existen parches disponibles para la mayoría de distribuciones más conocidas:
Anuncio de Ubuntu: https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available
Security Tracker de Debian: https://security-tracker.debian.org/tracker/CVE-2026-31431
Anuncio de AlmaLinux: https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available
Anuncio de Rocky Linux: https://kb.ciq.com/article/rocky-linux/rl-cve-2026-31431-mitigation
Security Tracker de Arch Linux: https://security.archlinux.org/CVE-2026-31431
AlmaLinux released critical kernel patches to fix Copy Fail (CVE-2026-31431), a high-severity vulnerability. Update your AlmaLinux systems today.
Full details here: https://ostechnix.com/almalinux-copy-fail-cve-2026-31431-fix/
#Copyfail #CVE202631431 #Almalinux #Linuxkernel #Patch #Linuxsecurity
Nine years in the Linux kernel and nobody noticed. "Copy Fail" (CVE-2026-31431) lets any local user grab root in seconds. CISA just added it to KEV. Working exploits for Ubuntu, Amazon Linux, RHEL, SUSE. Patch. - https://www.cisa.gov/news-events/alerts/2026/05/01/cisa-adds-one-known-exploited-vulnerability-catalog
732 bytes to root on every major Linux distro. No race condition. 100% reliable.
That's CVE-2026-31431 (Copy Fail) and it crosses container boundaries, which makes the flood of AI agent sandboxing content this week land differently.
Containers vs gVisor vs microVMs vs Wasm, Lima + libvirt setups, NixOS MicroVMs — all worth a read now.
Also: Claude Code agent teams, PS5 running Linux, Greg KH hunting kernel bugs with a local LLM, and a $20 SFP for 26ns NTP accuracy.
https://www.underkube.com/2026-05-03-what-edu-is-reading-this-week-apr-27-may-3-2026/
⚠️ A new #Linux flaw is now under active exploitation.
CISA added CVE-2026-31431 to its KEV list. The bug lets low-privilege users gain full root access. Patches released.
Fix deadline: May 15, 2026.
Read: https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html
Copy Fail: la #vulnerabilidad de #Linux que lleva 9 años escondida y permite obtener root con un script de 732 bytes
https://wwwhatsnew.com/2026/05/02/copy-fail-cve-2026-31431-linux-kernel-vulnerabilidad-ia-mayo-2026/
No setuid. No interactive users. No Python. No shell. Talos Linux barely flinched at Copy Fail. The kernel's still vulnerable and patched kernels shipped before disclosure, but the defaults carried the day. - https://www.siderolabs.com/blog/exploit-fail-cve-2026-31431-copy-fail-barely-scratches-talos-linux
@zhenech probably judging by though the verdict is still out apart from v3.1 self assessed. Linux kernel pfft, who do they think they are. ;)
https://nvd.nist.gov/vuln/detail/CVE-2026-31431
So your CISO is a beancounter?
Microsoft's Copy Fail threat report expects exploitation to ramp up soon. CISA added it to KEV on May 1. Five-phase attack chain, and the TLDR: treat any container RCE as potential host compromise. 732 bytes to root. - https://www.microsoft.com/en-us/security/blog/2026/05/01/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation/
Bluesky
Overview
Description
Statistics
- 7 Posts
- 1 Interaction
Fediverse
2026-W18 — Weekly Threat Roundup
🚨 Critical cPanel authentication bypass (CVE-2026-41940) under mass exploitation for ransomware deployment
🔗 Supply chain attacks hit SAP packages and PyTorch Lightning, stealing developer credentials
👮 Two US cybersecurity professionals sentenced to 4 years for conducting BlackCat ransomware at…
CVE-2026-41940: il bug CRLF di cPanel che ha consegnato 44.000 server al ransomware “Sorry”
Una vulnerabilità critica CVSS 9.8 nel pannello di controllo hosting più diffuso al mondo — sfruttata in silenzio per mesi prima della patch — ha permesso a un gruppo criminale di compromettere oltre 44.000 server e distribuire il ransomware “Sorry”. La tecnica: un’iniezione CRLF nel daemon di autenticazione di cPanel che consente accesso root senza credenziali.Bluesky
Overview
- GitHub
- Enterprise Server
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
Overview
- wclovers
- WCFM – Frontend Manager for WooCommerce
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
🔒 CVE-2026-2554: HIGH-severity IDOR in WCFM – Frontend Manager for WooCommerce lets Vendor+ users delete any account, incl. admins. No patch yet. Restrict Vendor access & monitor user deletions. More: https://radar.offseq.com/threat/cve-2026-2554-cwe-639-authorization-bypass-through-d8e3f679 #OffSeq #WordPress #WooCommerce #Infosec
Overview
- ggml-org
- llama.cpp
Description
Statistics
- 1 Post
- 1 Interaction
Overview
Description
Statistics
- 1 Post
Overview
- webaways
- NEX-Forms – Ultimate Forms Plugin for WordPress
Description
Statistics
- 1 Post
Fediverse
🚨 HIGH-severity XSS (CVE-2026-5063) in NEX-Forms – Ultimate Forms Plugin for WordPress (≤9.1.11): Unauthenticated attackers can inject persistent scripts. No patch yet — disable vulnerable versions and monitor for updates. https://radar.offseq.com/threat/cve-2026-5063-cwe-79-improper-neutralization-of-in-f0ffe501 #OffSeq #XSS #WordPress
Overview
- cyberhobo
- Geo Mashup
Description
Statistics
- 1 Post
Fediverse
🚨 HIGH severity: CVE-2026-4061 affects Geo Mashup ≤1.13.18 (WordPress). Unauthenticated SQL injection via 'map_post_type' lets attackers extract sensitive DB data if Geo Search is enabled. Disable Geo Search for now. https://radar.offseq.com/threat/cve-2026-4061-cwe-89-improper-neutralization-of-sp-374a2408 #OffSeq #WordPress #Vuln
Overview
- Edimax
- BR-6208AC
Description
Statistics
- 1 Post
Fediverse
🚨 HIGH severity buffer overflow in Edimax BR-6208AC (≤1.02) via /goform/setWAN. Exploit public, no vendor fix. Monitor and segment affected devices! CVE-2026-7685 https://radar.offseq.com/threat/cve-2026-7685-buffer-overflow-in-edimax-br-6208ac-c0df4819 #OffSeq #Vuln #IoTSecurity
Overview
- Edimax
- BR-6428nC
Description
Statistics
- 1 Post
Fediverse
🛡️ Buffer overflow (CVE-2026-7684, HIGH) in Edimax BR-6428nC (1.0 – 1.16) via /goform/setWAN. Public exploit exists. No patch from vendor. Mitigate by restricting remote access or replacing device. https://radar.offseq.com/threat/cve-2026-7684-buffer-overflow-in-edimax-br-6428nc-0d59eb52 #OffSeq #Vulnerability #IoTSecurity