CVE-2026-31431
Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability - [Actively Exploited]
Description
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
INFO
Published Date :
April 22, 2026, 9:16 a.m.
Last Modified :
May 11, 2026, 1:27 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.
"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Unknown
https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/; https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 ; https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/ ; https://nvd.nist.gov/vuln/detail/CVE-2026-31431
Affected Products
The following products are affected by CVE-2026-31431
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | HIGH | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
Solution
- Apply the reverted commit.
- Remove complexity for in-place operation.
- Copy associated data directly.
- Update the Linux kernel.
Public PoC/Exploit Available at Github
CVE-2026-31431 has a 561 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-31431.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-31431 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-31431
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
Python
Copy Fail (CVE-2026-31431)
C Python
Exploit for CVE-2026-31431 (Copy Fail)
Python
Defensive Linux Copy Kernel / Copy Fail vulnerability analysis and exposure auditor
Python Batchfile PowerShell Shell
AI security skills grounded in mid-2026 threat reality, not stale framework documentation
agents-md ai-security ai-skills cisa-kev claude-code codex compliance cve d3fend dora eu-ai-act iso-27001 mitre-atlas nis2 nist security threat-intelligence rwep
Dockerfile JavaScript
Relatório de Análise Técnica: Exploração de Falha de Isolamento no Kernel Linux (CVE-2026-31431)
Python
None
Dockerfile Makefile Python Shell
ayuda
Dockerfile Makefile Python Shell
None
Dockerfile Makefile Shell
Evaluaciòn
Dockerfile Makefile Shell Python C HTML
None
Dockerfile Makefile Shell Python
None
Dockerfile Makefile Shell Python
Final Test Second Term
Dockerfile Makefile Shell
evaluacion
Dockerfile Makefile Shell
Evaluación LAQZ.
Dockerfile Makefile Shell
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-31431 vulnerability anywhere in the article.
-
The Cyber Express
OpenAI Introduces AI Security Platform as Cyber Defense Race Heats Up
OpenAI has officially entered the AI cybersecurity race with the launch of OpenAI Daybreak, a new initiative focused on helping security teams identify, validate, and fix software vulnerabilities fast ... Read more
-
The Cyber Express
The Cyber Express Weekly Roundup: EU AI Act Updates, Malware Expansion, Critical Vulnerabilities, and Rising Cybercrime Trends
In this weekly roundup from The Cyber Express, the global cybersecurity landscape continues to show rapid and uneven change, shaped by both regulatory shifts and escalating cyber threats. Governments ... Read more
-
The Cyber Express
Dirty Frag Linux Vulnerability Exposes Major Distributions to Root Access Attacks
A newly disclosed local privilege escalation (LPE) vulnerability known as Dirty Frag is raising serious concerns across the Linux ecosystem after researchers revealed that the flaw can grant root acce ... Read more
-
The Hacker News
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31 ... Read more
-
CybersecurityNews
Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released
Dirty Frag is a newly disclosed, CVE-pending Linux kernel local privilege escalation (LPE) vulnerability that chains two separate page-cache write flaws, the xfrm-ESP Page-Cache Write and the RxRPC Pa ... Read more
-
The Cloudflare Blog
How Cloudflare responded to the “Copy Fail” Linux vulnerability
How Cloudflare responded to the “Copy Fail” Linux vulnerability2026-05-078 min readOn April 29, 2026, a Linux kernel local privilege escalation vulnerability was publicly disclosed under the name "Cop ... Read more
-
The Register
Attackers are cashing in on fresh 'CopyFail' Linux flaw
CISA is warning that a newly-disclosed Linux kernel bug dubbed "CopyFail" is already being exploited, just days after researchers dropped a working root-level exploit. Tracked as CVE-2026-31431, the b ... Read more
-
TheCyberThrone
CISA adds cPanel and Linux Kernel to KEV
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog — a critical authentication bypas ... Read more
-
CybersecurityNews
CISA Warns of Linux Kernel 0-Day Vulnerability Exploited in Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel zero-day vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning federal agencies ... Read more
-
security.nl
Microsoft en VS melden misbruik van Copy Fail-kwetsbaarheid
Aanvallers maken actief misbruik van de Copy Fail-kwetsbaarheid in Linux, waardoor een lokale unprivileged gebruiker root kan worden, zo melden Microsoft en het Amerikaanse cyberagentschap CISA. Micro ... Read more
-
The Hacker News
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) c ... Read more
-
Ars Technica
The most severe Linux threat to surface in years catches the world flat-footed
Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe ... Read more
-
security.nl
Copy Fail-kwetsbaarheid in Linux maakt lokale gebruiker root
Een onderzoeker heeft met behulp van een AI-tool een kwetsbaarheid in Linux gevonden waardoor een lokale unprivileged gebruiker root kan worden. Het probleem is in nagenoeg alle Linux-distributies aan ... Read more
-
The Hacker News
New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as ... Read more
-
CybersecurityNews
Linux Kernel 0-Day “Copy Fail” Roots Every Major Distribution Since 2017
A critical zero-day vulnerability in the Linux kernel has been publicly disclosed, enabling any unprivileged local user to obtain root access on virtually every major Linux distribution shipped since ... Read more
-
The Register
Linux cryptographic code flaw offers fast route to root
Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising from a logic flaw. The newly disclosed LPE, dubbed Copy Fail (CV ... Read more
The following table lists the changes that have been made to the
CVE-2026-31431 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
May. 11, 2026
Action Type Old Value New Value Added Reference Type CVE: https://www.kb.cert.org/vuls/id/260001 Types: Third Party Advisory -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 08, 2026
Action Type Old Value New Value Added Reference https://www.kb.cert.org/vuls/id/260001 -
Modified Analysis by [email protected]
May. 08, 2026
Action Type Old Value New Value Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/08/13 Types: Mailing List -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 08, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/08/13 -
Modified Analysis by [email protected]
May. 08, 2026
Action Type Old Value New Value Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/07/12 Types: Mailing List -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 08, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/07/12 -
Modified Analysis by [email protected]
May. 07, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:o:opensuse:leap:15.3:*:*:*:*:*:*:* *cpe:2.3:o:opensuse:leap:15.4:*:*:*:*:*:*:* *cpe:2.3:o:opensuse:leap:15.5:*:*:*:*:*:*:* *cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:openstack_cloud:9.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:caas_platform:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.2:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.1:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.3:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.2:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_server:4.3:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.2:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.3:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_retail_branch_server:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:manager_proxy:4.0:*:*:*:*:*:*:* *cpe:2.3:a:suse:enterprise_storage:7.1:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp1:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:rancher:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:business_critical_linux:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.1:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.5:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp3:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:business_critical_linux:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:-:*:* *cpe:2.3:o:suse:basesystem_module:15:sp1:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp2:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp3:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp1:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp2:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp3:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:public_cloud_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp3:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp4:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp5:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp4:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp5:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp4:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp5:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp6:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:basesystem_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:development_tools_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:public_cloud_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:legacy_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:realtime_module:15:sp7:*:*:*:suse_linux_enterprise:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss_extreme_core:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:ltss:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss_extended_security:-:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_availability_extension:16.0:-:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_workstation_extension:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:-:*:* *cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:sap:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:espos:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:ltss:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp6:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp7:*:*:-:*:*:* *cpe:2.3:o:suse:linux_enterprise_desktop:15:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp5:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp6:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp7:*:*:*:*:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.0:*:*:*:*:-:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:rancher:*:* *cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:rancher:*:* *cpe:2.3:o:suse:linux_micro:6.0:*:*:*:*:*:*:* *cpe:2.3:o:suse:linux_micro:6.1:*:*:*:*:*:*:* *cpe:2.3:o:suse:linux_micro:6.2:*:*:*:*:*:*:* Changed CPE Configuration OR *cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* OR *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/07/2 Types: Mailing List -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 07, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/07/2 -
Reanalysis by [email protected]
May. 06, 2026
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:* OR *cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* -
Modified Analysis by [email protected]
May. 06, 2026
Action Type Old Value New Value Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/06/5 Types: Mailing List -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 06, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/06/5 -
Modified Analysis by [email protected]
May. 05, 2026
Action Type Old Value New Value Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/10 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/11 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/12 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/13 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/14 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/24 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/27 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/28 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/29 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/31 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/8 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/9 Types: Mailing List -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 05, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/31 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 04, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/29 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 04, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/27 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/28 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 04, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/24 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 04, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/10 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/11 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/12 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/13 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/14 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/8 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/9 -
Modified Analysis by [email protected]
May. 04, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux:10.1:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:* *cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:* Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/10 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/12 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/15 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/16 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/17 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/18 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/22 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/23 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/24 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/14 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/15 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/16 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/17 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/18 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/19 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/20 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/21 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/23 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/24 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/25 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/4 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/5 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/6 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/7 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/02/8 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/10 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/12 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/13 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/3 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/4 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/5 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/03/6 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/1 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/04/2 Types: Mailing List Added Reference Type CISA-ADP: https://access.redhat.com/security/cve/cve-2026-31431#cve-details-mitigation Types: Third Party Advisory Added Reference Type CISA-ADP: https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/ Types: Vendor Advisory Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431 Types: US Government Resource Added Reference Type CISA-ADP: https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 Types: Exploit, Patch, Third Party Advisory -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 04, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/1 Added Reference http://www.openwall.com/lists/oss-security/2026/05/04/2 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/13 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/12 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/10 Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/5 Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/6 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/4 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/03/3 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/24 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/25 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/21 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/23 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 03, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/20 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 02, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/17 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/18 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/19 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 02, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/16 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 02, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/14 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/15 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 02, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/4 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/5 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/6 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/7 Added Reference http://www.openwall.com/lists/oss-security/2026/05/02/8 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 01, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/23 Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/24 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 01, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/22 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 01, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/17 Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/18 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 01, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/15 Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/16 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 01, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/10 Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/12 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
May. 01, 2026
Action Type Old Value New Value Added Reference https://access.redhat.com/security/cve/cve-2026-31431#cve-details-mitigation Added Reference https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/ Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431 Added Reference https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 -
Initial Analysis by [email protected]
May. 01, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.18.22 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.14 up to (excluding) 5.10.254 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.204 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.170 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.137 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.85 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.19 up to (excluding) 6.19.12 Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/29/23 Types: Exploit, Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/29/25 Types: Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/29/26 Types: Exploit, Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/10 Types: Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/11 Types: Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/12 Types: Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/14 Types: Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/15 Types: Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/16 Types: Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/17 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/18 Types: Exploit, Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/2 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/20 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/5 Types: Exploit, Mailing List, Patch Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/04/30/6 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/2 Types: Mailing List Added Reference Type CVE: http://www.openwall.com/lists/oss-security/2026/05/01/3 Types: Mailing List Added Reference Type CVE: https://copy.fail Types: Exploit Added Reference Type kernel.org: https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8 Types: Patch Added Reference Type CISA-ADP: https://github.com/theori-io/copy-fail-CVE-2026-31431 Types: Exploit Added Reference Type CVE: https://websec.net/blog/cve-2026-31431-linux-algifaead-page-cache-write-to-root-69f38a4ccddd2db1f520f170 Types: Exploit, Third Party Advisory -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 01, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/3 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 01, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/05/01/2 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/20 Added Reference https://websec.net/blog/cve-2026-31431-linux-algifaead-page-cache-write-to-root-69f38a4ccddd2db1f520f170 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/17 Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/18 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/14 Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/15 Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/16 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/12 -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 30, 2026
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c Added Reference https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc Added Reference https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667 Added Reference https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82 Added Reference https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/11 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/10 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/2 Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/5 Added Reference http://www.openwall.com/lists/oss-security/2026/04/30/6 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 30, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/29/25 Added Reference http://www.openwall.com/lists/oss-security/2026/04/29/26 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 29, 2026
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2026/04/29/23 Added Reference https://copy.fail -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Apr. 29, 2026
Action Type Old Value New Value Added CWE CWE-669 Added Reference https://github.com/theori-io/copy-fail-CVE-2026-31431 -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 27, 2026
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 22, 2026
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly. Added Reference https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5 Added Reference https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237 Added Reference https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8