Aggregator
Linux内核维护者称赞AI审阅代码非常好用 虽然有错误但也找到大量问题
Breaking out: Can AI agents escape their sandboxes?
Container sandboxes are part of routine AI agent testing and deployment. Agents use them to run code, edit files, and interact with system resources without direct access to the host. The SandboxEscapeBench benchmark, developed by researchers at the University of Oxford and the AI Security Institute, evaluates whether an agent with shell access can escape a container and reach the host system. Evaluation architecture and scenario taxonomy (Source: AI Security Institute) What SandboxEscapeBench measures SandboxEscapeBench … More →
The post Breaking out: Can AI agents escape their sandboxes? appeared first on Help Net Security.
CVE-2026-23320 | Linux Kernel up to 6.18.16/6.19.6 f_ncm ncm_alloc_inst null pointer dereference (WID-SEC-2026-0861)
CVE-2026-23321 | Linux Kernel up to 7.0-rc2 MPTCP Endpoint net/mptcp/pm_kernel.c local_addr_used privilege escalation (Nessus ID 303728 / WID-SEC-2026-0861)
CVE-2026-23316 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 net fib_multipath_hash_from_keys denial of service (Nessus ID 303730 / WID-SEC-2026-0861)
CVE-2026-23319 | Linux Kernel up to 7.0-rc2 bpf_trampoline_link_cgroup_shim use after free (WID-SEC-2026-0861)
CVE-2026-23324 | Linux Kernel up to 7.0-rc2 etas_es58x usb_kill_anchored_urbs privilege escalation (WID-SEC-2026-0861)
CVE-2026-23318 | Linux Kernel up to 7.0-rc1 UAC3 Section UAC_VERSION_2 out-of-bounds (Nessus ID 303723 / WID-SEC-2026-0861)
CVE-2026-23326 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc2 xsk xp_free initialization (Nessus ID 303743 / WID-SEC-2026-0861)
CVE-2026-23327 | Linux Kernel up to 6.19.6/7.0-rc1 mbox cxl_payload_from_user_allowed in_size null pointer dereference
CVE-2026-23315 | Linux Kernel up to 7.0-rc2 wifi mt76_connac2_mac_write_txwi_80211 out-of-bounds (Nessus ID 303742 / WID-SEC-2026-0861)
CVE-2026-23317 | Linux Kernel up to 7.0-rc1 vmwgfx vmw_translate_ptr uninitialized pointer (WID-SEC-2026-0861)
CVE-2026-23325 | Linux Kernel up to 6.6.129/6.12.76/6.18.16/6.19.6/7.0-rc2 wifi mt7996_mac_write_txwi_80211 mgmt out-of-bounds (WID-SEC-2026-0861)
企业微信推出CLI工具 内置12个智能体技能 可执行多种功能操作
请停止使用“AI安全”或“智能体安全”这样的表述
注意喚起: F5 BIG-IP Access Policy Managerの脆弱性(CVE-2025-53521)に関する注意喚起 (公開)
Добро пожаловать в прошлый век. Порт Виго перешёл на бумагу после визита хакеров
The Hidden Tracking Risk Inside Your Tires
Don’t count on government guidance after a smart home breach
People are filling their homes with internet-connected cameras, speakers, locks, and routers. When one of those devices is compromised, the next steps are often unclear. Researchers reviewing government cybersecurity advice in 11 countries found that most guidance focuses on prevention, leaving households with limited support after a breach. The analysis covers Australia, Austria, Canada, Finland, France, Germany, Japan, New Zealand, Singapore, the United Kingdom, and the United States. Prevention advice is widely available Government agencies … More →
The post Don’t count on government guidance after a smart home breach appeared first on Help Net Security.