Agregátor RSS

K vydání Nvidia N1/N1X nedojde dříve než říjnu, softwarové problémy stále trvají

CD-R server - 30 Duben, 2026 - 07:40
Dlouho očekávané procesory Nvidia N1 a N1X měly podle posledních zpráv dorazit na Computexu. Reálně však nemáme čekat více než ohlášení. Reálné vydání se chystá na říjen a i tak může být papírové…
Kategorie: IT News

Linux cryptographic code flaw offers fast route to root

The Register - Anti-Virus - 30 Duben, 2026 - 02:01
Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising from a logic flaw. The newly disclosed LPE, dubbed Copy Fail (CVE-2026-31431), comes from a vulnerability in the Linux kernel's authencesn cryptographic template. "An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root," the writeup from security biz Theori explains. The kernel reads the page cache when it loads a binary, so modifying the cached copy amounts to altering the binary for the purpose of program execution. But doing so doesn't trigger any defenses focused on file system events like inotify. The proof of concept exploit is a 10-line, 732-byte Python script capable of editing a setuid binary to gain root on almost all Linux distributions released since 2017. Copy Fail is similar to other LPE bugs such as Dirty Cow and Dirty Pipe, but its finders claim it doesn't require winning a race condition and it's more broadly applicable. It's not remotely exploitable on its own – hence LPE – but if chained with a web RCE, malicious CI runner, or SSH compromise, it could be relevant to an external attacker. The bug is of most immediate concern to those using multi-tenant Linux systems, shared-kernel containers, or CI runners that execute untrusted code. According to Theori, the vulnerability also represents a potential container escape primitive that could affect Kubernetes nodes, because the page cache is shared across the host. Linux distros Debian, Ubuntu, and SUSE have issued patches for the problem, as have overseers of other distros. Red Hat initially said it was going to defer the fix but later changed its guidance to indicate it will go along with other distros and patch promptly. The CVE has been rated High severity, 7.8 out of 10. Theori researcher Taeyang Lee identified the vulnerability, with the help of the company's AI security scanning software, Xint Code. The number of bug reports has surged in recent months, helped by AI-powered flaw-finders. Microsoft just reported the second largest number of patches ever. Dustin Childs, head of threat awareness for Trend Micro's Zero Day Initiative, expects this is due to security teams using AI to hunt bugs. "There are many things we could speculate on to justify the size, but if Microsoft is like the other programs out there (including ours), they are likely seeing a rise in submissions found by AI tools," he wrote earlier this month. AI-assisted vulnerability research recently prompted the Internet Bug Bounty (IBB) program to suspend awards until it can understand how to manage the growing volume of reports. ®
Kategorie: Viry a Červi

Linux cryptographic code flaw offers fast route to root

The Register - Anti-Virus - 30 Duben, 2026 - 02:01
Patches land for authencesn flaw enabling local privilege escalation

Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising from a logic flaw.…

Kategorie: Viry a Červi

[webapps] FUXA 1.2.8 - Authentication Bypass + RCE Exploit

The Exploit Database - 30 Duben, 2026 - 02:00
FUXA 1.2.8 - Authentication Bypass + RCE Exploit

[webapps] Python-Multipart 0.0.22 - Path Traversal

The Exploit Database - 30 Duben, 2026 - 02:00
Python-Multipart 0.0.22 - Path Traversal

[local] Google Chrome 145.0.7632.75 - CSSFontFeatureValuesMap

The Exploit Database - 30 Duben, 2026 - 02:00
Google Chrome 145.0.7632.75 - CSSFontFeatureValuesMap

[local] Windows 11 23H2 - Denial of Service (DoS)

The Exploit Database - 30 Duben, 2026 - 02:00
Windows 11 23H2 - Denial of Service (DoS)

[webapps] Repetier-Server 1.4.10 - Path Traversal

The Exploit Database - 30 Duben, 2026 - 02:00
Repetier-Server 1.4.10 - Path Traversal

[webapps] HUSTOJ Zip-Slip v26.01.24 - RCE

The Exploit Database - 30 Duben, 2026 - 02:00
HUSTOJ Zip-Slip v26.01.24 - RCE

[webapps] BusyBox 1.37.0 - Path Traversal

The Exploit Database - 30 Duben, 2026 - 02:00
BusyBox 1.37.0 - Path Traversal

[local] Windows 11 25H2 - Heap Overflow

The Exploit Database - 30 Duben, 2026 - 02:00
Windows 11 25H2 - Heap Overflow

[webapps] JUNG Smart Visu Server 1.1.1050 - Dos

The Exploit Database - 30 Duben, 2026 - 02:00
JUNG Smart Visu Server 1.1.1050 - Dos

[webapps] SumatraPDF 3.5.2 - Remote Code Execution

The Exploit Database - 30 Duben, 2026 - 02:00
SumatraPDF 3.5.2 - Remote Code Execution

[webapps] NiceGUI 3.6.1 - Path Traversal

The Exploit Database - 30 Duben, 2026 - 02:00
NiceGUI 3.6.1 - Path Traversal

[webapps] Frigate NVR 0.16.3 - Remote Code Execution

The Exploit Database - 30 Duben, 2026 - 02:00
Frigate NVR 0.16.3 - Remote Code Execution

[webapps] Js2Py 0.74 - RCE

The Exploit Database - 30 Duben, 2026 - 02:00
Js2Py 0.74 - RCE

[webapps] Camaleon CMS v2.9.0 - Path Traversal

The Exploit Database - 30 Duben, 2026 - 02:00
Camaleon CMS v2.9.0 - Path Traversal

[webapps] Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection

The Exploit Database - 30 Duben, 2026 - 02:00
Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection

[webapps] Erugo 0.2.14 - Remote Code Execution (RCE)

The Exploit Database - 30 Duben, 2026 - 02:00
Erugo 0.2.14 - Remote Code Execution (RCE)

[webapps] deephas 1.0.7 - Prototype Pollution

The Exploit Database - 30 Duben, 2026 - 02:00
deephas 1.0.7 - Prototype Pollution
Syndikovat obsah