Independent writer on tech, security, and self-hosting.
VPS hardening, CTF write-ups, CVE breakdowns, and reviews of tools I actually run.
✍ Written by enim
🔗 https://blog.byte-guard.net
#infosec #selfhosting #homelab #docker #devops #ctf
Independent writer on tech, security, and self-hosting.
VPS hardening, CTF write-ups, CVE breakdowns, and reviews of tools I actually run.
✍ Written by enim
🔗 https://blog.byte-guard.net
#infosec #selfhosting #homelab #docker #devops #ctf
CW: Local privilege escalation
copy.fail is a Linux kernel LPE disclosed by Theori on 29 April 2026 that writes directly into the page cache of files the attacker does not own. The exploit chains AF_ALG sockets with splice() to bypass filesystem checks, leaving disk-based monitors like AIDE blind to the modification. It affects all major distributions including Ubuntu, RHEL, and Debian because the mainline fix only landed on 1 April.
FreeBSD-SA-26:13.exec documents a local privilege escalation via execve() on FreeBSD 14.2 and 13.4. The flaw allows unprivileged users to bypass security restrictions by manipulating environment variables during binary execution, granting root access on affected systems. Patches are available in FreeBSD 14.2-RELEASE-p2 and 13.4-RELEASE-p3. Upgrade immediately to close this vector.
CW: Data breach
ShinyHunters claimed responsibility for the Canvas outage that disrupted finals week across US schools. The ransomware group asserts access to 275 million records from 8,800 institutions, including names, emails, student IDs, and platform messages. Instructure confirmed unauthorized activity matching a breach disclosed a week prior but states passwords and financial data remain untouched. The platform returned to service Friday morning after a temporary shutdown.