<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with lpe]]></title><description><![CDATA[A list of topics that have been tagged with lpe]]></description><link>https://board.circlewithadot.net/tags/lpe</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 21:37:09 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/lpe.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[Keep calm that they keep on coming...]]></title><description><![CDATA[Keep calm that they keep on coming... Better fire up you mitigations because this is probably going to take a while to patch fully.https://lore.kernel.org/netdev/agVpIsaSherjHTYg@sultan-box/#fragnesia #linux #lpe]]></description><link>https://board.circlewithadot.net/topic/8c2865ac-3a2d-436c-9b50-824cb8c8d552/keep-calm-that-they-keep-on-coming...</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/8c2865ac-3a2d-436c-9b50-824cb8c8d552/keep-calm-that-they-keep-on-coming...</guid><dc:creator><![CDATA[r3pek@mastodon.r3pek.org]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[And another...]]></title><description><![CDATA[@r3pek Right I understand that, but mitigations are applied faster than kernel patches, and luckily the mitigations are the same.]]></description><link>https://board.circlewithadot.net/topic/95422c17-08e6-4773-875c-80d1104e9f1a/and-another...</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/95422c17-08e6-4773-875c-80d1104e9f1a/and-another...</guid><dc:creator><![CDATA[mttaggart@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[#LPE — Local Privilege Escalation.]]></title><description><![CDATA[@jwildeboer CVE-2026-23918 against Apache HTTPD was / is at the same time than CopyFail / DirtyFrag and could have been a good way to execute the POC.]]></description><link>https://board.circlewithadot.net/topic/62fe8b51-6f75-40f5-8fc6-30afac0621b3/lpe-local-privilege-escalation.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/62fe8b51-6f75-40f5-8fc6-30afac0621b3/lpe-local-privilege-escalation.</guid><dc:creator><![CDATA[bortzmeyer@mastodon.gougere.fr]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Another fucking day, another fuckling #Linux #LPE: https:&#x2F;&#x2F;github.com&#x2F;V4bel&#x2F;dirtyfrag]]></title><description><![CDATA[Another fucking day, another fuckling #Linux #LPE: https://github.com/V4bel/dirtyfrag]]></description><link>https://board.circlewithadot.net/topic/ed6daacc-5b7e-44de-bf9d-626fda6180ed/another-fucking-day-another-fuckling-linux-lpe-https-github.com-v4bel-dirtyfrag</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/ed6daacc-5b7e-44de-bf9d-626fda6180ed/another-fucking-day-another-fuckling-linux-lpe-https-github.com-v4bel-dirtyfrag</guid><dc:creator><![CDATA[wtfismyip@gnu.gl]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>