Tagged articles
8 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 30, 2026 · Information Security

Linux Kernel’s ‘Copy Fail’ CVE‑2026‑31431: A 732‑Byte Python Script Grants Root in One Step

A newly disclosed Linux kernel vulnerability (CVE‑2026‑31431, dubbed “Copy Fail”) allows an unprivileged user to execute a 732‑byte Python script that writes four controllable bytes into the page cache, directly modifying /usr/bin/su to obtain root, affecting all kernels from 2017 to the patch release and posing severe risks such as container escape and cloud‑tenant isolation breaches.

CVE-2026-31431LinuxSecurity
0 likes · 11 min read
Linux Kernel’s ‘Copy Fail’ CVE‑2026‑31431: A 732‑Byte Python Script Grants Root in One Step
MaGe Linux Operations
MaGe Linux Operations
Apr 17, 2026 · Information Security

Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide

This comprehensive guide explains the most common Linux privilege‑escalation vectors—including unsafe SUID binaries, sudo misconfigurations, cron jobs, password and SSH‑key leaks, kernel vulnerabilities, container escapes, and file‑permission flaws—while providing concrete detection commands and practical hardening steps for each risk.

BashHardeningLinux security
0 likes · 23 min read
Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide
IT Architects Alliance
IT Architects Alliance
Apr 9, 2026 · Information Security

Why 68% of Kubernetes Clusters Expose Cloud Credentials and How to Fix the Top 3 Risks

A recent study reveals that over two‑thirds of Kubernetes clusters contain critical misconfigurations that let attackers escape containers, steal cloud credentials, and hijack entire cloud accounts within minutes, and the article outlines the three most dangerous flaws, real‑world attack paths, and concrete mitigation steps.

Credential LeakageDefense in DepthKubernetes
0 likes · 8 min read
Why 68% of Kubernetes Clusters Expose Cloud Credentials and How to Fix the Top 3 Risks
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Dec 9, 2025 · Information Security

How to Tame Kubernetes Security: From Roles to Token Risks

This article explains why Kubernetes security feels like navigating in the dark, breaks down the platform’s core resources, outlines common attack vectors such as container escape and token abuse, compares managed versus self‑hosted clusters, and presents a real‑world EKS attack case with practical mitigation insights.

Cloud NativeKubernetesOps
0 likes · 11 min read
How to Tame Kubernetes Security: From Roles to Token Risks
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Feb 4, 2024 · Information Security

Understanding the runc 1.1.11 Container Escape Bug and How to Secure Your Hosts

The article explains the runc 1.1.11 container‑escape vulnerability (CVE‑2024‑21626), how it allows attackers to break out of containers and gain host privileges, details Huawei Cloud’s reproduction steps, and provides mitigation guidance including upgrading to runc 1.1.12 and using HSS scanning and intrusion‑detection features.

CVE-2024-21626HSScontainer escape
0 likes · 4 min read
Understanding the runc 1.1.11 Container Escape Bug and How to Secure Your Hosts
Meituan Technology Team
Meituan Technology Team
Mar 12, 2020 · Information Security

Cloud Native Security: Container Escape and Mitigation Strategies

Meituan's security team explains cloud‑native architecture, outlines container‑escape threats from kernel bugs, vulnerable runtimes and misconfigurations, and recommends mitigation through hardened kernels, secure‑container runtimes like gVisor or Kata, rigorous patch management, and collaborative feature development to strengthen runtime protection.

Container SecurityDockerKata Containers
0 likes · 20 min read
Cloud Native Security: Container Escape and Mitigation Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Feb 14, 2019 · Information Security

Critical runc Container Escape Vulnerability Advisory (CVE-2019-5736)

A critical CVE‑2019‑5736 vulnerability in the runc container runtime lets a malicious container overwrite the host’s runc binary, granting attackers root‑level code execution that can compromise other containers, the host system, and the network, with a CVSS 3.0 score of 7.2, affecting runc, Apache Mesos and LXC, and requiring prompt updates.

Container SecurityKernel SecurityVulnerability
0 likes · 3 min read
Critical runc Container Escape Vulnerability Advisory (CVE-2019-5736)