WhisperX tag archive

#container escape

This page collects WhisperX intelligence signals tagged #container escape. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-05-01 16:24:06 · GitHub Issues

1. CVE-2026-31431: copy.fail Kernel Flaw Enables Local Root Escalation, Threatens Privileged Containers

A newly tracked vulnerability, CVE-2026-31431, has surfaced in the copy.fail component of the Linux kernel, enabling local privilege escalation to root for attackers who already have foothold on a targeted system. The flaw, referenced in upstream reporting via LWN.net, carries potential impact comparable to the notorio...

The Lab · 2026-05-11 08:40:30 · GitHub Issues

2. CVE-2026-43284 « Dirty Frag » : faille Linux Kernel permet une élévation de privilèges root — aucun correctif disponible

Une vulnérabilité critique de type Local Privilege Escalation, désignée CVE-2026-43284 et connue sous le nom Dirty Frag, a été divulguée le 7 mai 2026. Elle affecte les modules noyau Linux `esp4` et `esp6`, responsables du traitement IPsec ESP utilisé par des solutions VPN telles que StrongSwan ou le fallback WireGuard...

The Lab · 2026-05-13 09:48:26 · GitHub Issues

3. Scaleway Patches Kapsule Against Dirty Frag Kernel LPE After Functions-Runner Container Escape Risk Flagged

Scaleway has issued a security advisory addressing CVE-2026-43284, a Linux kernel local privilege escalation vulnerability affecting the ESP IPsec transform modules (`esp4`/`esp6`) and the AF_RXRPC socket family (`rxrpc`). The flaw mirrors the threat shape of CVE-2026-31431 (Copy Fail), allowing a local unprivileged us...