← back

CVE-2026-42786

EPSS 0.1%
hype MIXED · 42 hack

Real vuln, clear patch available, but no weaponization signal; mostly feed chatter.

What: Unbounded WebSocket frame reassembly in Bandit (Elixir web server) versions 0.5.0–<1.11.0 allows unauthenticated remote DoS via memory exhaustion; affects Phoenix and LiveView applications directly.

Why it matters: Published May 1, 2026; no KEV listing yet but high-severity resource-exhaustion flaw in widely-deployed framework. No public PoC observed in chatter, but vulnerability is straightforward to trigger—continuation frames without size limits. Phoenix/LiveView users are already being advised to patch or limit connections. Vendor (mtrudel) has patched in 1.11.0.

Where it's seen: Initial disclosure posts on Twitter and Bluesky linking to CVE feeds and threat radar; mostly rebroadcasting the NVD description. Defender guidance surfacing ("monitor usage, limit connections"). No PoC code or mass-scanning reports yet.

RISK: HIGH — Trivial DoS against any Phoenix/LiveView app accepting WebSocket without per-connection frame-count limits.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/2/2026, 4:44:21 AM

Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthenticated remote denial of service via memory exhaustion. The fragment reassembly path in 'Elixir.Bandit.WebSocket.Connection':handle_frame/3 in lib/bandit/websocket/connection.ex appends every incoming Continuation{fin: false} frame's payload to a per-connection iolist with no cumulative size cap. The existing max_frame_size option only bounds individual frames; a peer that streams an unbounded number of continuation frames without ever setting fin=1 grows BEAM heap linearly until the OS or a supervisor kills the process. Because the accumulation happens before WebSock.handle_in/2 is called, the application has no opportunity to interpose a size check. Phoenix Channels and LiveView both run over WebSock on Bandit, so a stock Phoenix application exposes this surface as soon as it accepts socket connections. This issue affects bandit: from 0.5.0 before 1.11.0.

Articles & coverage 5 articles

  • The most severe Linux threat to surface in years catches the world ...

    Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe compromises inside data centers and on personal devices. The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after

  • CVE-2026-4786 Detail - NVD

    | URL | Source(s) | Tag(s) | | --- | --- | --- | | | Python Software Foundation | | | | Python Software Foundation | | | | Python Software Foundation | | | | Python Software Foundation | | | | Python Software Foundation | | | | Python Software Foundation | | | | Python Software Foundation | | | [https://mail.python.org/archives/list/[email protected]/thread/JQDUNJVB4AQNTJECSUKOBDU3XC

  • Copy Fail Explained [CVE-2026-31431] - YouTube

    Copy Fail is the latest Linux privesc CVE, and it's a relatively simply exploit that overwrites files in the in-memory cache.

  • SUSE responds to the copy.fail vulnerability

    # SUSE responds to the copy.fail vulnerability. Copy Fail (tracked as CVE-2026-31431) is a critical vulnerability in the Linux kernel that allows a local non-root user to gain full root access to the system. * SLES 15 (all service packs, including Micro 5.x and openSUSE Leap 15.6). How it works: Uses a combination of the splice() system call and the AF\_ALG kernel encryption interface. Due to a 20

  • New Linux 'Copy Fail' Vulnerability Enables Root Access on Major ...

    [![Image 10: Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiptXaD_Im0Bee0znCFTtBnOBEGGfeP-lS85crmRfAsd5-sMOsHstg9jATLVQOSJF2tiQQ6qkQ2ZWK98foU4WIQU_tHja8H882jF-_oiA5UGh-iG0-ByeaGfBbjDGid-FkfsNfKQUljfBsgejRsHBiBeX1DXRbjf1ohM1uhZiKdsjpBaH_0lYylOWSA9itt/w72-h72-c-rw-e365/linux.jpg) Harvester Deploys Linux GoGr

NVD details 1 CWE ·0 vendors · 4 refs expand

Description

Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthenticated remote denial of service via memory exhaustion. The fragment reassembly path in 'Elixir.Bandit.WebSocket.Connection':handle_frame/3 in lib/bandit/websocket/connection.ex appends every incoming Continuation{fin: false} frame's payload to a per-connection iolist with no cumulative size cap. The existing max_frame_size option only bounds individual frames; a peer that streams an unbounded number of continuation frames without ever setting fin=1 grows BEAM heap linearly until the OS or a supervisor kills the process. Because the accumulation happens before WebSock.handle_in/2 is called, the application has no opportunity to interpose a size check. Phoenix Channels and LiveView both run over WebSock on Bandit, so a stock Phoenix application exposes this surface as soon as it accepts socket connections. This issue affects bandit: from 0.5.0 before 1.11.0.

Weaknesses

References

Top posts driving the trend