#vulnerability

22 posts · Last used 21h

Back to Timeline
@data0@indieweb.social · 21h ago

I couldn’t find a list of #Linux #kernel versions that include a patch for #copyfail, so I dug into the commit log and made one. Make sure you’re using at least the following version of your branch to mitigate against copyfail:

  • 7.0-rc7 (any stable 7.x is safe)
  • 6.19.12
  • 6.18.22
  • 6.12.85
  • 6.6.137
  • 6.1.170
  • 5.15.204
  • 5.10.254

See https://copy.fail for more info about the #exploit.

#privilegeescalation #vulnerability #cryptography #linuxadmin #sysadmin

3
0
2
@beyondmachines1@infosec.exchange · 21h ago

Copy Fail: Linux Kernel Flaw Grants Root Access On All Major Distributions

A Linux kernel vulnerability called “Copy Fail” (CVE-2026-31431) allows unprivileged local users to gain root privileges with 100% reliability by corrupting the shared page cache. The flaw affects nearly all Linux distributions since 2017 and enables container escapes because the memory corruption does not modify files on disk.

If you run Linux servers, especially shared environments like Kubernetes clusters, CI/CD runners, or multi-tenant hosts, patch your kernel immediately to a version that includes the fix (mainline commit a664bf3d603d) for CVE-2026-31431. If you can’t patch right away, disable the vulnerable module by running echo “install algif_aead /bin/false” > /etc/modprobe.d/disable-algif.conf followed by rmmod algif_aead, and for untrusted code environments block AF_ALG socket creation via seccomp as a long-term safeguard. #cybersecurity #infosec #advisory #vulnerability https://beyondmachines.net/event_details/copy-fail-linux-kernel-flaw-grants-root-access-on-all-major-distributions-w-l-v-0-c/gD2P6Ple2L

1
0
2
Boosted by Kevin Karhan @kkarhan@jorts.horse
@hackerworkspace@infosec.exchange · Apr 24, 2026
0
0
1
@AAKL@infosec.exchange · Apr 22, 2026
2
0
1
Boosted by stux⚡️ @stux@mstdn.social
@h4ckernews@mastodon.social · Apr 11, 2026
0
0
3
@HamiltonsLive@universeodon.com · Apr 15, 2026
#LovingKindnessCompassion #premium #Vulnerability The Gift of Being Alive: A Q&A with Rhonda Magee: Former Mindful editor Stephanie Domet sits down for a Q&A with Rhonda Magee on being with vulnerability, getting angry, and knowing joy and healing are possible. The post The Gift of Being Alive: A Q&A with Rhonda Magee appeared first on Mindful. http://dlvr.it/TS2fbp
0
0
0
@indieauthornews@indieauthors.social · Mar 06, 2026
What You Edit Out Reveals Who You Are as a Writer Your revision history actually shows your best writing Continue reading on The Writing Cooperative » https://writingcooperative.com/what-you-edit-out-reveals-who-you-are-as-a-writer-086ccc4ebcf #lifelessons #selfimprovement #writingtips #vulnerability #writing
0
0
2
@Hackread@mstdn.social · Feb 22, 2026
📢⚠️ Researchers demonstrate multiple attacks against major password managers, including Bitwarden, LastPass, and Dashlane, showing how compromised servers and design flaws can expose encrypted vault data. Read: https://hackread.com/researchers-demonstrate-password-managers-attacks/ #CyberSecurity #PasswordManager #Vulnerability #Privacy
1
0
4
@tomas@indieauthors.social · Feb 16, 2026
Progress stories ignore our vulnerability to Others. Thinking through self-containment (at any scale) - an essential element of progress literature - negates transformation through encounters and all patterns of confluence and influence. An alternative narrative could be to acknowledge a perpetual state of precarity. A precarious world is a world without progress teleology. Agnostic about where we're going, we might then look for what has been ignored by the current hegemonic story. We are surrounded by many world-making projects; human and not-human. And usually these overlap too. Instead of colonial histories, we must fill both history and future with these 'contamination traditions'. #vulnerability #theOthers #selfcontainment #progressteleology #transformationthroughencounters #TSING
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/qce11wDNyBC78tLqnRKmds 🔗 🇩🇪🇺🇸🇫🇷

La configuration d’un système NetBSD en lecture seule atténue un point de vulnérabilité critique souvent négligé : la corruption du système de fichiers sur des supports de stockage peu fiables.

#vulnerability #netbsd #runbsd #ownyourdata #itnotes

0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/nQCwqAv8Gf7ahWVFEfdz2R 🔗 🇩🇪🇺🇸🇫🇷

A practical guide to hardening embedded systems by eliminating file system write vulnerabilities through a memory-backed root configuration.

#vulnerability #netbsd #runbsd #ownyourdata #itnotes

0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/bG7GEPHbVSBzsFmeoM1LAD 🔗 🇩🇪🇺🇸🇫🇷

Die Absicherung des Dateisystems als kritische Maßnahme gegen Datenkorruption und Ausfälle

#vulnerability #netbsd #runbsd #ownyourdata #itnotes

0
0
0
@wtfismyip@gnu.gl · Feb 11, 2026

High severity authorization #vulnerability in Keycloak:

  1. Of course it’s because of JWT
  2. If a project with a sole purpose is authn/authz is getting #JWT wrong, you probably are too.

https://github.com/advisories/GHSA-hcvw-475w-8g7p

0
0
0
@hbrpgm@adalta.social · Feb 09, 2026

📺 https://peer.adalta.social/w/ha7u8osqJ9djsMHeNLvuaH 🔗 🇩🇪🇺🇸🇫🇷

Une faille de dépassement de tampon accessible à distance compromet l’intégrité des réseaux, avec un exploit public disponible.

#infosec #vulnerability #cve #exploit #release

0
0
0
@hbrpgm@adalta.social · Feb 09, 2026

📺 https://peer.adalta.social/w/kpVddxKp2FBwhdvJ28fzU2 🔗 🇩🇪🇺🇸🇫🇷

A publicly released exploit for a critical buffer overflow in Tenda routers demands immediate action from network defenders.

#infosec #vulnerability #cve #exploit #release

0
0
0
@hbrpgm@adalta.social · Feb 09, 2026

📺 https://peer.adalta.social/w/jG6JrBKpEnD9cTemxKWzzY 🔗 🇩🇪🇺🇸🇫🇷

Ein veröffentlichter Proof-of-Concept-Exploit für einen Remote-Buffer-Overflow erhöht das Risiko für ungepatchte Netzwerke erheblich.

#infosec #vulnerability #cve #exploit #release

0
0
0
@harrysintonen@infosec.exchange · Feb 06, 2026
Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope. Madness. source: https://mrbruh.com/amd/ #vulnerability #infosec #cybersecurity
73
0
80
@hbrpgm@adalta.social · Feb 05, 2026

📺 https://peer.adalta.social/w/tuYBhErBwiJHz3GM2eKdaS 🔗 🇩🇪🇺🇸🇫🇷

Une faille de sécurité majeure force une mise à jour obligatoire et immédiate pour tous les déploiements.

#linux #security #vulnerability #cloud #docker

0
0
0
@Schlumpf23@social.linux.pizza · Jan 31, 2026
800K Linux servers with a Telnet vulnerability. Unless you need it to talk to some legacy systems, turn Telnet off, it's 2026. https://www.youtube.com/watch?v=81fq__6a1FQ #Telnet #Vulnerability
0
0
0
@hbrpgm@adalta.social · Jan 29, 2026
📺 https://peer.adalta.social/w/czT4evi4npSbK3nLpqUYfP Kritische RCE-Schwachstelle in Cisco Unified Communications Ein unauthentifizierter Angreifer kann übe #security #vulnerability #cve #cloud #rce
0
0
0