Known Exploited Vulnerability
7.8
HIGH CVSS 3.1
CVE-2026-31431
Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability - [Actively Exploited]
Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

INFO

Published Date :

April 22, 2026, 9:16 a.m.

Last Modified :

May 11, 2026, 1:27 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

Required Action :

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Known Ransomware Campaign Use:

Unknown

Notes :

https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/; https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 ; https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/ ; https://nvd.nist.gov/vuln/detail/CVE-2026-31431

Affected Products

The following products are affected by CVE-2026-31431 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Suse linux_enterprise_server
2 Suse linux_enterprise_desktop
3 Suse suse_linux
4 Suse caas_platform
5 Suse openstack_cloud
6 Suse manager_server
7 Suse linux_enterprise_high_performance_computing
8 Suse linux_enterprise_workstation_extension
9 Suse linux_enterprise_high_availability_extension
10 Suse linux_enterprise_real_time
11 Suse linux_enterprise_live_patching
12 Suse manager_proxy
13 Suse enterprise_storage
14 Suse openstack_cloud_crowbar
15 Suse manager_retail_branch_server
16 Suse linux_enterprise_micro
17 Suse basesystem_module
18 Suse development_tools_module
19 Suse legacy_module
20 Suse linux_micro
21 Suse public_cloud_module
22 Suse realtime_module
1 Redhat enterprise_linux
2 Redhat openshift_container_platform
1 Linux linux_kernel
1 Canonical ubuntu_linux
1 Debian debian_linux
1 Opensuse leap
1 Novell suse_linux
1 Amazon amazon_linux
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
Revert in-place operations in algif_aead and copy associated data.
  • Apply the reverted commit.
  • Remove complexity for in-place operation.
  • Copy associated data directly.
  • Update the Linux kernel.
Public PoC/Exploit Available at Github

CVE-2026-31431 has a 561 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-31431.

URL Resource
https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c Patch
https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc Patch
https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667 Patch
https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82 Patch
https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b Patch
https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5 Patch
https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237 Patch
https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8 Patch
http://www.openwall.com/lists/oss-security/2026/04/29/23 Exploit Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/29/25 Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/29/26 Exploit Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/10 Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/11 Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/12 Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/14 Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/15 Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/16 Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/17 Mailing List
http://www.openwall.com/lists/oss-security/2026/04/30/18 Exploit Mailing List
http://www.openwall.com/lists/oss-security/2026/04/30/2 Mailing List
http://www.openwall.com/lists/oss-security/2026/04/30/20 Mailing List
http://www.openwall.com/lists/oss-security/2026/04/30/5 Exploit Mailing List Patch
http://www.openwall.com/lists/oss-security/2026/04/30/6 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/10 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/12 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/15 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/16 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/17 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/18 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/2 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/22 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/23 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/24 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/01/3 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/14 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/15 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/16 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/17 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/18 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/19 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/20 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/21 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/23 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/24 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/25 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/4 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/5 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/6 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/7 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/02/8 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/03/10 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/03/12 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/03/13 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/03/3 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/03/4 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/03/5 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/03/6 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/1 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/10 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/11 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/12 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/13 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/14 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/2 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/24 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/27 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/28 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/29 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/31 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/8 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/04/9 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/06/5 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/07/12 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/07/2 Mailing List
http://www.openwall.com/lists/oss-security/2026/05/08/13 Mailing List
https://copy.fail Exploit
https://websec.net/blog/cve-2026-31431-linux-algifaead-page-cache-write-to-root-69f38a4ccddd2db1f520f170 Exploit Third Party Advisory
https://www.kb.cert.org/vuls/id/260001 Third Party Advisory
https://access.redhat.com/security/cve/cve-2026-31431#cve-details-mitigation Third Party Advisory
https://github.com/theori-io/copy-fail-CVE-2026-31431 Exploit
https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/ Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431 US Government Resource
https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 Exploit Patch Third Party Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-31431 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-31431 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python

Updated: 13 hours, 2 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 10:45 p.m. This repo has been linked 1 different CVEs too.

Copy Fail (CVE-2026-31431)

C Python

Updated: 16 hours, 26 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 7:23 p.m. This repo has been linked 1 different CVEs too.

Exploit for CVE-2026-31431 (Copy Fail)

Python

Updated: 17 hours, 12 minutes ago
1 stars 0 fork 0 watcher
Born at : May 11, 2026, 5:58 p.m. This repo has been linked 1 different CVEs too.

Defensive Linux Copy Kernel / Copy Fail vulnerability analysis and exposure auditor

Python Batchfile PowerShell Shell

Updated: 14 hours, 30 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 4:41 p.m. This repo has been linked 1 different CVEs too.

AI security skills grounded in mid-2026 threat reality, not stale framework documentation

agents-md ai-security ai-skills cisa-kev claude-code codex compliance cve d3fend dora eu-ai-act iso-27001 mitre-atlas nis2 nist security threat-intelligence rwep

Dockerfile JavaScript

Updated: 12 hours, 24 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 4:11 p.m. This repo has been linked 5 different CVEs too.

Relatório de Análise Técnica: Exploração de Falha de Isolamento no Kernel Linux (CVE-2026-31431)

Python

Updated: 21 hours, 38 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 1:35 p.m. This repo has been linked 1 different CVEs too.

None

Dockerfile Makefile Python Shell

Updated: 22 hours, 41 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 1:12 p.m. This repo has been linked 1 different CVEs too.

ayuda

Dockerfile Makefile Python Shell

Updated: 22 hours, 56 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:58 p.m. This repo has been linked 1 different CVEs too.

None

Dockerfile Makefile Shell

Updated: 23 hours, 19 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:35 p.m. This repo has been linked 1 different CVEs too.

Evaluaciòn

Dockerfile Makefile Shell Python C HTML

Updated: 21 hours, 42 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:35 p.m. This repo has been linked 1 different CVEs too.

None

Dockerfile Makefile Shell Python

Updated: 22 hours ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:35 p.m. This repo has been linked 1 different CVEs too.

None

Dockerfile Makefile Shell Python

Updated: 15 hours, 9 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:35 p.m. This repo has been linked 1 different CVEs too.

Final Test Second Term

Dockerfile Makefile Shell

Updated: 22 hours, 4 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:35 p.m. This repo has been linked 1 different CVEs too.

evaluacion

Dockerfile Makefile Shell

Updated: 23 hours, 19 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:35 p.m. This repo has been linked 1 different CVEs too.

Evaluación LAQZ.

Dockerfile Makefile Shell

Updated: 23 hours, 19 minutes ago
0 stars 0 fork 0 watcher
Born at : May 11, 2026, 12:35 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-31431 vulnerability anywhere in the article.

  • The Cyber Express
OpenAI Introduces AI Security Platform as Cyber Defense Race Heats Up

OpenAI has officially entered the AI cybersecurity race with the launch of OpenAI Daybreak, a new initiative focused on helping security teams identify, validate, and fix software vulnerabilities fast ... Read more

Published Date: May 12, 2026 (4 hours, 14 minutes ago)
  • The Cyber Express
The Cyber Express Weekly Roundup: EU AI Act Updates, Malware Expansion, Critical Vulnerabilities, and Rising Cybercrime Trends

In this weekly roundup from The Cyber Express, the global cybersecurity landscape continues to show rapid and uneven change, shaped by both regulatory shifts and escalating cyber threats. Governments ... Read more

Published Date: May 08, 2026 (3 days, 23 hours ago)
  • The Cyber Express
Dirty Frag Linux Vulnerability Exposes Major Distributions to Root Access Attacks

A newly disclosed local privilege escalation (LPE) vulnerability known as Dirty Frag is raising serious concerns across the Linux ecosystem after researchers revealed that the flaw can grant root acce ... Read more

Published Date: May 08, 2026 (4 days, 3 hours ago)
  • The Hacker News
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31 ... Read more

Published Date: May 08, 2026 (4 days, 6 hours ago)
  • CybersecurityNews
Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released

Dirty Frag is a newly disclosed, CVE-pending Linux kernel local privilege escalation (LPE) vulnerability that chains two separate page-cache write flaws, the xfrm-ESP Page-Cache Write and the RxRPC Pa ... Read more

Published Date: May 08, 2026 (4 days, 7 hours ago)
  • The Cloudflare Blog
How Cloudflare responded to the “Copy Fail” Linux vulnerability

How Cloudflare responded to the “Copy Fail” Linux vulnerability2026-05-078 min readOn April 29, 2026, a Linux kernel local privilege escalation vulnerability was publicly disclosed under the name "Cop ... Read more

Published Date: May 07, 2026 (4 days, 22 hours ago)
  • The Register
Attackers are cashing in on fresh 'CopyFail' Linux flaw

CISA is warning that a newly-disclosed Linux kernel bug dubbed "CopyFail" is already being exploited, just days after researchers dropped a working root-level exploit. Tracked as CVE-2026-31431, the b ... Read more

Published Date: May 05, 2026 (6 days, 20 hours ago)
  • TheCyberThrone
CISA adds cPanel and Linux Kernel to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog — a critical authentication bypas ... Read more

Published Date: May 04, 2026 (1 week ago)
  • CybersecurityNews
CISA Warns of Linux Kernel 0-Day Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel zero-day vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning federal agencies ... Read more

Published Date: May 04, 2026 (1 week ago)
  • security.nl
Microsoft en VS melden misbruik van Copy Fail-kwetsbaarheid

Aanvallers maken actief misbruik van de Copy Fail-kwetsbaarheid in Linux, waardoor een lokale unprivileged gebruiker root kan worden, zo melden Microsoft en het Amerikaanse cyberagentschap CISA. Micro ... Read more

Published Date: May 04, 2026 (1 week, 1 day ago)
  • The Hacker News
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) c ... Read more

Published Date: May 03, 2026 (1 week, 2 days ago)
  • Ars Technica
The most severe Linux threat to surface in years catches the world flat-footed

Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe ... Read more

Published Date: Apr 30, 2026 (1 week, 4 days ago)
  • security.nl
Copy Fail-kwetsbaarheid in Linux maakt lokale gebruiker root

Een onderzoeker heeft met behulp van een AI-tool een kwetsbaarheid in Linux gevonden waardoor een lokale unprivileged gebruiker root kan worden. Het probleem is in nagenoeg alle Linux-distributies aan ... Read more

Published Date: Apr 30, 2026 (1 week, 4 days ago)
  • The Hacker News
New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as ... Read more

Published Date: Apr 30, 2026 (1 week, 5 days ago)
  • CybersecurityNews
Linux Kernel 0-Day “Copy Fail” Roots Every Major Distribution Since 2017

A critical zero-day vulnerability in the Linux kernel has been publicly disclosed, enabling any unprivileged local user to obtain root access on virtually every major Linux distribution shipped since ... Read more

Published Date: Apr 30, 2026 (1 week, 5 days ago)
  • The Register
Linux cryptographic code flaw offers fast route to root

Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising from a logic flaw. The newly disclosed LPE, dubbed Copy Fail (CV ... Read more

Published Date: Apr 30, 2026 (1 week, 5 days ago)

The following table lists the changes that have been made to the CVE-2026-31431 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    May. 11, 2026

    Action Type Old Value New Value
    Added Reference Type CVE: https://www.kb.cert.org/vuls/id/260001 Types: Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 08, 2026

    Action Type Old Value New Value
    Added Reference https://www.kb.cert.org/vuls/id/260001
  • Modified Analysis by [email protected]

    May. 08, 2026

    Action Type Old Value New Value
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/08/13 Types: Mailing List
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 08, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/08/13
  • Modified Analysis by [email protected]

    May. 08, 2026

    Action Type Old Value New Value
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/07/12 Types: Mailing List
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 08, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/07/12
  • Modified Analysis by [email protected]

    May. 07, 2026

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:o:opensuse:leap:15.3:*:*:*:*:*:*:* *cpe:2.3:o:opensuse:leap:15.4:*:*:*:*:*:*:* *cpe:2.3:o:opensuse:leap:15.5:*:*:*:*:*:*:* *cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:openstack_cloud:9.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:caas_platform:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.2:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.1:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.3:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.2:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.3:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.2:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.3:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:enterprise_storage:7.1:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp1:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:rancher:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:business_critical_linux:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.1:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.5:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp3:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:business_critical_linux:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:-:*:* *cpe:2.3:o:suse:basesystem_module:15:sp1:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp2:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp3:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp1:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp2:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp3:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:public_cloud_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp3:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp4:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp5:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp4:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp5:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp4:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp5:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:public_cloud_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:legacy_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss_extreme_core:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss_extended_security:-:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:16.0:-:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_workstation_extension:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp6:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp7:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.0:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:rancher:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:rancher:*:* *cpe:2.3:o:suse:linux_micro:6.0:*:*:*:*:*:*:* *cpe:2.3:o:suse:linux_micro:6.1:*:*:*:*:*:*:* *cpe:2.3:o:suse:linux_micro:6.2:*:*:*:*:*:*:*
    Changed CPE Configuration OR *cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* OR *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:*
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/07/2 Types: Mailing List
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 07, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/07/2
  • Reanalysis by [email protected]

    May. 06, 2026

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:* OR *cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:*
  • Modified Analysis by [email protected]

    May. 06, 2026

    Action Type Old Value New Value
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/06/5 Types: Mailing List
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 06, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/06/5
  • Modified Analysis by [email protected]

    May. 05, 2026

    Action Type Old Value New Value
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/10 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/11 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/12 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/13 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/14 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/24 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/27 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/28 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/29 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/31 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/8 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/9 Types: Mailing List
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 05, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/31
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 04, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/29
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 04, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/27
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/28
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 04, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/24
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 04, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/10
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/11
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/12
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/13
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/14
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/8
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/9
  • Modified Analysis by [email protected]

    May. 04, 2026

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux:10.1:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:*
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/10 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/12 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/15 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/16 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/17 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/18 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/22 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/23 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/24 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/14 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/15 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/16 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/17 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/18 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/19 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/20 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/21 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/23 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/24 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/25 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/4 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/5 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/6 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/7 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/8 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/10 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/12 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/13 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/3 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/4 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/5 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/6 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/1 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/2 Types: Mailing List
    Added Reference Type CISA-ADP: https://access.redhat.com/security/cve/cve-2026-31431#cve-details-mitigation Types: Third Party Advisory
    Added Reference Type CISA-ADP: https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/ Types: Vendor Advisory
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431 Types: US Government Resource
    Added Reference Type CISA-ADP: https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 Types: Exploit, Patch, Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 04, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/1
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/2
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/13
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/12
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/10
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/5
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/6
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/4
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/3
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/24
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/25
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/21
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/23
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 03, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/20
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 02, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/17
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/18
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/19
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 02, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/16
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 02, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/14
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/15
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 02, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/4
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/5
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/6
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/7
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/8
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/23
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/24
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/22
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/17
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/18
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/15
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/16
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/10
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/12
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/security/cve/cve-2026-31431#cve-details-mitigation
    Added Reference https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431
    Added Reference https://xint.io/blog/copy-fail-linux-distributions#the-fix-6
  • Initial Analysis by [email protected]

    May. 01, 2026

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.18.22 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.14 up to (excluding) 5.10.254 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.204 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.170 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.137 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.85 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.19 up to (excluding) 6.19.12
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/29/23 Types: Exploit, Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/29/25 Types: Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/29/26 Types: Exploit, Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/10 Types: Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/11 Types: Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/12 Types: Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/14 Types: Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/15 Types: Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/16 Types: Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/17 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/18 Types: Exploit, Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/2 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/20 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/5 Types: Exploit, Mailing List, Patch
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/6 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/2 Types: Mailing List
    Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/3 Types: Mailing List
    Added Reference Type CVE: https://copy.fail Types: Exploit
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8 Types: Patch
    Added Reference Type CISA-ADP: https://github.com/theori-io/copy-fail-CVE-2026-31431 Types: Exploit
    Added Reference Type CVE: https://websec.net/blog/cve-2026-31431-linux-algifaead-page-cache-write-to-root-69f38a4ccddd2db1f520f170 Types: Exploit, Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/3
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 01, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/2
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/20
    Added Reference https://websec.net/blog/cve-2026-31431-linux-algifaead-page-cache-write-to-root-69f38a4ccddd2db1f520f170
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/17
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/18
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/14
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/15
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/16
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/12
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c
    Added Reference https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc
    Added Reference https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667
    Added Reference https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82
    Added Reference https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/11
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/10
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/2
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/5
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/6
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 30, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/29/25
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/29/26
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 29, 2026

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2026/04/29/23
    Added Reference https://copy.fail
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Apr. 29, 2026

    Action Type Old Value New Value
    Added CWE CWE-669
    Added Reference https://github.com/theori-io/copy-fail-CVE-2026-31431
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Apr. 27, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Apr. 22, 2026

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
    Added Reference https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5
    Added Reference https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237
    Added Reference https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.