Agregátor RSS
K vydání Nvidia N1/N1X nedojde dříve než říjnu, softwarové problémy stále trvají
Dlouho očekávané procesory Nvidia N1 a N1X měly podle posledních zpráv dorazit na Computexu. Reálně však nemáme čekat více než ohlášení. Reálné vydání se chystá na říjen a i tak může být papírové…
Kategorie: IT News
Linux cryptographic code flaw offers fast route to root
Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising from a logic flaw. The newly disclosed LPE, dubbed Copy Fail (CVE-2026-31431), comes from a vulnerability in the Linux kernel's authencesn cryptographic template. "An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root," the writeup from security biz Theori explains. The kernel reads the page cache when it loads a binary, so modifying the cached copy amounts to altering the binary for the purpose of program execution. But doing so doesn't trigger any defenses focused on file system events like inotify. The proof of concept exploit is a 10-line, 732-byte Python script capable of editing a setuid binary to gain root on almost all Linux distributions released since 2017. Copy Fail is similar to other LPE bugs such as Dirty Cow and Dirty Pipe, but its finders claim it doesn't require winning a race condition and it's more broadly applicable. It's not remotely exploitable on its own – hence LPE – but if chained with a web RCE, malicious CI runner, or SSH compromise, it could be relevant to an external attacker. The bug is of most immediate concern to those using multi-tenant Linux systems, shared-kernel containers, or CI runners that execute untrusted code. According to Theori, the vulnerability also represents a potential container escape primitive that could affect Kubernetes nodes, because the page cache is shared across the host. Linux distros Debian, Ubuntu, and SUSE have issued patches for the problem, as have overseers of other distros. Red Hat initially said it was going to defer the fix but later changed its guidance to indicate it will go along with other distros and patch promptly. The CVE has been rated High severity, 7.8 out of 10. Theori researcher Taeyang Lee identified the vulnerability, with the help of the company's AI security scanning software, Xint Code. The number of bug reports has surged in recent months, helped by AI-powered flaw-finders. Microsoft just reported the second largest number of patches ever. Dustin Childs, head of threat awareness for Trend Micro's Zero Day Initiative, expects this is due to security teams using AI to hunt bugs. "There are many things we could speculate on to justify the size, but if Microsoft is like the other programs out there (including ours), they are likely seeing a rise in submissions found by AI tools," he wrote earlier this month. AI-assisted vulnerability research recently prompted the Internet Bug Bounty (IBB) program to suspend awards until it can understand how to manage the growing volume of reports. ®
Kategorie: Viry a Červi
Linux cryptographic code flaw offers fast route to root
Patches land for authencesn flaw enabling local privilege escalation
Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising from a logic flaw.…
Kategorie: Viry a Červi
[webapps] FUXA 1.2.8 - Authentication Bypass + RCE Exploit
FUXA 1.2.8 - Authentication Bypass + RCE Exploit
Kategorie: Security Vulnerabilities & Exploits
[webapps] Python-Multipart 0.0.22 - Path Traversal
Python-Multipart 0.0.22 - Path Traversal
Kategorie: Security Vulnerabilities & Exploits
[local] Google Chrome 145.0.7632.75 - CSSFontFeatureValuesMap
Google Chrome 145.0.7632.75 - CSSFontFeatureValuesMap
Kategorie: Security Vulnerabilities & Exploits
[local] Windows 11 23H2 - Denial of Service (DoS)
Windows 11 23H2 - Denial of Service (DoS)
Kategorie: Security Vulnerabilities & Exploits
[webapps] Repetier-Server 1.4.10 - Path Traversal
Repetier-Server 1.4.10 - Path Traversal
Kategorie: Security Vulnerabilities & Exploits
[webapps] HUSTOJ Zip-Slip v26.01.24 - RCE
HUSTOJ Zip-Slip v26.01.24 - RCE
Kategorie: Security Vulnerabilities & Exploits
[webapps] BusyBox 1.37.0 - Path Traversal
BusyBox 1.37.0 - Path Traversal
Kategorie: Security Vulnerabilities & Exploits
[local] Windows 11 25H2 - Heap Overflow
Windows 11 25H2 - Heap Overflow
Kategorie: Security Vulnerabilities & Exploits
[webapps] JUNG Smart Visu Server 1.1.1050 - Dos
JUNG Smart Visu Server 1.1.1050 - Dos
Kategorie: Security Vulnerabilities & Exploits
[webapps] SumatraPDF 3.5.2 - Remote Code Execution
SumatraPDF 3.5.2 - Remote Code Execution
Kategorie: Security Vulnerabilities & Exploits
[webapps] NiceGUI 3.6.1 - Path Traversal
NiceGUI 3.6.1 - Path Traversal
Kategorie: Security Vulnerabilities & Exploits
[webapps] Frigate NVR 0.16.3 - Remote Code Execution
Frigate NVR 0.16.3 - Remote Code Execution
Kategorie: Security Vulnerabilities & Exploits
[webapps] Camaleon CMS v2.9.0 - Path Traversal
Camaleon CMS v2.9.0 - Path Traversal
Kategorie: Security Vulnerabilities & Exploits
[webapps] Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection
Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection
Kategorie: Security Vulnerabilities & Exploits
[webapps] Erugo 0.2.14 - Remote Code Execution (RCE)
Erugo 0.2.14 - Remote Code Execution (RCE)
Kategorie: Security Vulnerabilities & Exploits
[webapps] deephas 1.0.7 - Prototype Pollution
deephas 1.0.7 - Prototype Pollution
Kategorie: Security Vulnerabilities & Exploits
- « první
- ‹ předchozí
- …
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- …
- následující ›
- poslední »



