24h | 7d | 30d

Overview

  • Linux
  • Linux

22 Apr 2026
Published
04 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.98%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 26 Posts
  • 45 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Sobre la vulnerabilidad del Kernel (CVE-2026-31431) conocida con el nombre #CopyFail (más información: copy.fail)

Comentaros que ya existen parches disponibles para la mayoría de distribuciones más conocidas:

Anuncio de Ubuntu: ubuntu.com/blog/copy-fail-vuln

Security Tracker de Debian: security-tracker.debian.org/tr

Anuncio de AlmaLinux: ubuntu.com/blog/copy-fail-vuln

Anuncio de Rocky Linux: kb.ciq.com/article/rocky-linux

Security Tracker de Arch Linux: security.archlinux.org/CVE-202

  • 13
  • 11
  • 0
  • 22h ago
Profile picture fallback

Heise berichtet: Die Linux-Lücke „Copy Fail“ (CVE-2026-31431) wird bereits aktiv ausgenutzt — lokaler Root-Zugriff. Admins sollten sofort verfügbare Kernel-Updates/Packages einspielen. Details & PoC: heise.de/news/Linux-Luecke-Cop 🔥🛡️🐧 #Linux #Security #CVE202631431

Edit/Korrektur: Laut @giggls
ist ein Container-Escape nicht möglich.

  • 3
  • 1
  • 0
  • 1h ago
Profile picture fallback

AlmaLinux released critical kernel patches to fix Copy Fail (CVE-2026-31431), a high-severity vulnerability. Update your AlmaLinux systems today.

Full details here: ostechnix.com/almalinux-copy-f

#Copyfail #CVE202631431 #Almalinux #Linuxkernel #Patch #Linuxsecurity

  • 1
  • 2
  • 0
  • 23h ago
Profile picture fallback

Security teams: "Copy Fail" (CVE-2026-31431) is now being exploited — a local→root Linux kernel LPE affecting many distros since 2017. Patches are available; update immediately. Details: heise.de/en/news/Linux-vulnera 🚨🛡️ #Linux #infosec #CVE202631431

  • 1
  • 1
  • 0
  • 1h ago
Profile picture fallback

⚠️ A new flaw is now under active exploitation.

CISA added CVE-2026-31431 to its KEV list. The bug lets low-privilege users gain full root access. Patches released.

Fix deadline: May 15, 2026.

Read: thehackernews.com/2026/05/cisa

  • 0
  • 1
  • 0
  • 23h ago
Profile picture fallback

Copy.fail: a small Linux kernel bug with an unusually big blast radius jorijn.com/en/blog/copy-fail-c

  • 0
  • 1
  • 0
  • 5h ago
Profile picture fallback

@zhenech probably judging by though the verdict is still out apart from v3.1 self assessed. Linux kernel pfft, who do they think they are. ;)

nvd.nist.gov/vuln/detail/CVE-2

So your CISO is a beancounter?

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

Microsoft's Copy Fail threat report expects exploitation to ramp up soon. CISA added it to KEV on May 1. Five-phase attack chain, and the TLDR: treat any container RCE as potential host compromise. 732 bytes to root. - microsoft.com/en-us/security/b

  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback

CVE-2026-31431, also known as CopyFail, is a Local Privilege Escalation (LPE) vulnerability in which an attacker can escalate an already compromised and authenticated standard user to root privileges, which are the highest privileges on the host. This vulnerability affects most popular Linux distributions, as well as many virtualized and hardware environments where Linux is present.

The vulnerability is present in the algif_aead module of the Linux kernel, which is responsible for hardware-accelerated cryptography. Canonical, the company behind Ubuntu, pushed out an update that disables the algif_aead module to mitigate the CopyFail vulnerability, however, Canonical notes that this mitigation will not be necessary once the kernel is updated.

Disabling the affected module should make applications fallback from hardware-accelerated cryptography to userspace cryptographic functions. However, because of the complexity and variation of configurations across many environments, it is recommended to test this mitigation in staging first, as some applications may not include or support userspace cryptographic functions. A reboot is also recommended to complete the mitigation, as some applications may require a reboot to trigger the fallback.

To protect systems running Ubuntu and Ubuntu-based distributions against this vulnerability, follow the steps below:

Open a terminal and type:

1. apt changelog kmod

This checks the changelog for the version of the kmod tool currently installed on your system and shows a list of changes, which will confirm whether the CopyFail vulnerability was mitigated. Check the top entry to confirm the mitigation, as shown in the attached screenshot, if the top entry mentions "* Disable loading of algif_aead module to mitigate CVE-2026-31431", you already have the update installed that mitigates the CopyFail vulnerability but if there is no mention of the CVE, continue with the steps below.

2. sudo apt-get update

This will update your package index files so you can install newly released updates.

3. sudo apt-get install --only-upgrade kmod

This command will upgrade only kmod, a tool used to configure kernel modules on Ubuntu, the new release contains the mitigation for your current kernel.

4. sudo reboot

This will reboot the operating system.

5. apt changelog kmod

Repeat the command from the first step to confirm whether the mitigation is in place. The top entry should now say "* Disable loading of algif_aead module to mitigate CVE-2026-31431".

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-31431, a Linux root access bug also known as Copy Fail, to its Known Exploited Vulnerabilities catalog due to active exploitation. This privilege escalation flaw allows unprivileged local users to gain root access by corrupting the kernel's page cache, posing a significant risk to cloud and containerized environments.
thehackernews.com/2026/05/cisa

  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback

@clock

I don't know if this helps, but I don't see your kernel listed here: debiansupport.com/blog/copy-fa

Edit to add that I also have not seen any differentiation between arm and x86_64 vulnerabilities (in general, not just pi-related).

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback

@clock whilst I was doom-scrolling, this popped up from a few hours ago. I kinda think you're ok since you're on 6.x.

explains.social/@veronica/stat

also:
security-tracker.debian.org/tr

  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback

60 Sekunden Cyber KW18 2026, 27. April - 3. Mai:

Daten von Kunden und Benutzern von Vimeo werden von der Gruppierung ShinyHunters ins Dark Net gestellt, Sicherheitsforscher finden mit Copy Fail eine seit 2017 (!) bestehende Schwachstelle (CVE-2026-31431), mit der man root-Zugriff auf allen bekannteren Linux-Distributionen erhalten kann, das NGO noyb klagt gegen die Hamburger

60-sekunden-cyber.de/kw18-2026/

#cyber #cybersicherheit #itsicherheit #itsecurity #infosec #threatint #threatintel #news #update

  • 0
  • 0
  • 1
  • 2h ago

Bluesky

Profile picture fallback
The latest update for #Mendit includes "PhantomRaven Wave 5: New Undocumented NPM #SupplyChain Campaign Targets DeFi, #Cloud, and AI Developers" and "CVE-2026-31431 (Copy Fail): #Linux Kernel LPE". #CyberSecurity #DevOps #OpenSource #Compliance https://opsmtrs.com/3zEYo7d
  • 0
  • 3
  • 0
  • 7h ago
Profile picture fallback
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 2
  • 0
  • 12h ago
Profile picture fallback
WSL2+Docker環境における、CVE-2026-31431 (Copy Fail) への対策メモ https://zenn.dev/user_thebigslee/articles/41b570658f911b
  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback
CISA Highlights CVE-2026-31431 as an Active Linux Root Exploitation Risk #CISAKEVcatalog #ContainerSecurityRisk #CVE202631431
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
📢 CVE-2026-31431 (Copy.Fail) : workaround eBPF pour une LPE via AF_ALG socket Linux 📝 ## 🔍 Contexte Publié le 3 mai 2026 sur GitHub (dépôt `wgnet/wg.copyfail.… https://cyberveille.ch/posts/2026-05-03-cve-2026-31431-copy-fail-workaround-ebpf-pour-une-lpe-via-af-alg-socket-linux/ #AF_ALG #Cyberveille
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
📢 CopyFail (CVE-2026-31431) : élévation de privilèges critique affectant quasiment tous les noyaux Linux 📝 ## 🗓️ Contexte Publié le 30 avri… https://cyberveille.ch/posts/2026-05-03-copyfail-cve-2026-31431-elevation-de-privileges-critique-affectant-quasiment-tous-les-noyaux-linux/ #CI_CD #Cyberveille
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
CVE-2026-31431: The 732-Byte Script That Renders All Linux Kernel Defenses Since 2017 Obsolete + Video Introduction: A recently disclosed local privilege escalation (LPE) vulnerability identified as CVE-2026-31431 and codenamed "Copy Fail" has sent shockwaves through the cybersecurity community.…
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
「Copy Fail」Linux バグ:732バイトのスクリプトで2017年以降のほぼすべてのディストリビューションにて root 権限の取得が可能に - BigGo ニュース Linux カーネルにおける「Copy Fail」と命名された CVE-2026-31431 という深刻な論理ベースの脆弱性は、オープンソースおよびクラウドコンピューティングの ... biggo.jp/news/2026050...
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV reconbee.com/cisa-adds-ac... #CISA #linuxrootaccess #CVE #Linuxroot #cyberattack
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
CVE-2026-31431:我用 DeepSeek 复现了 AI 发现Copy Fail 提权的全过程 - CVE-2026-31431: I used DeepSeek to reproduce the entire process of AI detecting Copy Fail privilege escalation.
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
01 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
28.36%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 13 Posts
  • 15 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

CVE-2026-41940: il bug CRLF di cPanel che ha consegnato 44.000 server al ransomware “Sorry”
#CyberSecurity
insicurezzadigitale.com/cve-20

  • 4
  • 0
  • 0
  • 17h ago
Profile picture fallback

APT Campaign Exploits cPanel CVE-2026-41940 to Breach Government and Military Servers Across South-East Asia
#CyberSecurity
securebulletin.com/apt-campaig

  • 4
  • 0
  • 0
  • 16h ago
Profile picture fallback

CVE-2026-41940: il bug CRLF di cPanel che ha consegnato 44.000 server al ransomware “Sorry”

Una vulnerabilità critica CVSS 9.8 nel pannello di controllo hosting più diffuso al mondo — sfruttata in silenzio per mesi prima della patch — ha permesso a un gruppo criminale di compromettere oltre 44.000 server e distribuire il ransomware “Sorry”. La tecnica: un’iniezione CRLF nel daemon di autenticazione di cPanel che consente accesso root senza credenziali.

insicurezzadigitale.com/cve-20

  • 0
  • 0
  • 1
  • 18h ago

Bluesky

Profile picture fallback
A critical cPanel authentication bypass vulnerability (CVE-2026-41940) is being exploited in widespread "Sorry" ransomware attacks days after the release of an emergency update. www.bleepingcomputer.com/news/securit...
  • 0
  • 2
  • 0
  • 2h ago
Profile picture fallback
CVE-2026-41940: CRLF Injection Opens 70 Million cPanel Hosts to Complete Takeover + Video Introduction: A maximum-severity vulnerability tracked as CVE-2026-41940 (CVSS 10.0) is currently being exploited in the wild, compromising thousands of servers hosting an estimated 70 million domains. The…
  • 0
  • 1
  • 0
  • 13h ago
Profile picture fallback
📢 CVE-2026-41940 : faille critique cPanel exploitée avant patch, ransomware signalé 📝 ## 🗞️ Contexte Article publié le 1er mai 2026 par *The Register*… https://cyberveille.ch/posts/2026-05-03-cve-2026-41940-faille-critique-cpanel-exploitee-avant-patch-ransomware-signale/ #CVE_2026_41940 #Cyberveille
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
⚠️ Ransomware Sorry Les instances cPanel sont actuellement ciblées. Les pirates exploitent la faille critique CVE-2026-41940 pour ensuite chiffrer les fichiers du serveur Linux avec le ransomware Sorry. Plus d'infos 👇 - www.it-connect.fr/linux-les-do... #linux #cpanel #ransomware
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
CVE-2026-41940: Il Bug CRLF di cPanel che ha Consegnato 44.000 Server al Ransomware “Sorry” il blog: insicurezzadigitale.com/cve-2026-419... #cybersecurity #infosec #ransomware #zeroday
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: (CVE-2026-41940) cPanel & WHM Authentication Bypass via CRLF Injection" and "Emerging Threat: (CVE-2026-3854) #GitHub Enterprise Server RCE via Git Push Injection". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
30 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
7.19%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 3 hours ago

Fediverse

Profile picture fallback
[RSS] A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202

https://www.akamai.com/blog/security-research/2026/apr/incomplete-patch-apt28s-zero-day-cve-2026-32202
  • 1
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
[RSS] A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202 www.akamai.com -> Original->
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • GeoVision Inc.
  • GV-VMS V20.0.2

04 May 2026
Published
04 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

GV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance cameras and manage other security devices. It is a native application accessed locally, but it is also possible to enable remote access via the "WebCam Server" feature. Once enabled, it is possible to access to the management and monitoring feature via a regular Web interface. This webersever is another native application, compiled without ASLR, which makes exploitation much easier and more likely. Most of the features require authentication before being reachable and leverage a standard login page to grant access. However the `gvapi` endpoint uses its own authentication mechanism via an `HTTP Authorization` header. It supports both `Basic` authentication and the `Digest` modes of authentication.   #### Stack-overflow via unbound copy of base64 decoded string The `b64decoder` string is sized dynamically, but it is then copied to the `Buffer` stack variable one character at the time at [0], and there's no bound-check. As such, if the decoded string is bigger than 256 characters (the size of the `Buffer` variable) then a stack overflow occurs. Because the data can be fully controlled by an attacker and lack of ASLR, this vulnerability can easily be exploited to gain full code execution as SYSTEM on the machine running the service.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Fediverse

Profile picture fallback

🚨 CVE-2026-42369 (CRITICAL, CVSS 10): GeoVision GV-VMS V20.0.2 stack overflow in gvapi endpoint lets unauthenticated remote attackers execute code as SYSTEM. Restrict remote access, monitor for patches. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture fallback
🚨 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server. 🔗 basefortify.eu/cve_reports/... #CVE #CyberSecurity #GeoVision
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • GeoVision Inc.
  • GV-LPC2011/LPC2211

04 May 2026
Published
04 May 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
Pending

KEV

Description

A privilege escalation vulnerability exists in the Web Interface functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted HTTP request can lead to execute priviledged operation. An attacker can visit a webpage to trigger this vulnerability.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: Last hour

Fediverse

Profile picture fallback

🌐 CVE-2026-42368 | CRITICAL privilege escalation in GeoVision GV-LPC2011/LPC2211 v1.10. Remote attackers can gain full control via crafted HTTP requests. No patch — restrict web interface access & monitor traffic. Details: radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • Last hour

Overview

  • WebPros
  • Comet Backup

04 May 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
Pending

KEV

Description

A critical IDOR vulnerability has been discovered in Comet Backup affecting all versions from 20.11.0 to 26.1.1 and 26.2.1. The vulnerability allows a tenant administrator to impersonate any end-user account of other tenants on the same server via a vulnerable API call.

Statistics

  • 1 Post

Last activity: 3 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-29200: CRITICAL IDOR in WebPros Comet Backup (20.11.0 – 26.1.1, 26.2.1) lets tenant admins impersonate any end user on the server. No patch yet — restrict admin access and monitor for suspicious cross-tenant activity. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 3h ago

Overview

  • MindsDB

03 May 2026
Published
03 May 2026
Updated

CVSS v4.0
MEDIUM (5.3)
EPSS
Pending

KEV

Description

A security vulnerability has been detected in MindsDB up to 26.01. Affected is the function pickle.loads of the component Pickle Handler. The manipulation leads to deserialization. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-7712: MEDIUM severity deserialization vuln in MindsDB ≤26.01 (pickle.loads). Public exploit available, remote attack possible. No vendor response yet. Check your exposure. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Totolink
  • WA300

04 May 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is the function loginauth of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument http_host results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Totolink WA300 (5.2cu.7112_B20190227) faces a CRITICAL buffer overflow (CVE-2026-7719) via http_host in /cgi-bin/cstecgi.cgi. Public exploit out, no patch yet. Limit exposure, monitor closely. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Sudo project
  • Sudo

03 Apr 2026
Published
04 Apr 2026
Updated

CVSS v3.1
HIGH (7.4)
EPSS
0.00%

KEV

Description

In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
A sudo vulnerability (CVE-2026-35535) could let any local user gain root on Rocky Linux. Here's how to check, patch, and automate updates: Read more -> tinyurl.com/2kd8ztbp #Security
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • VEGA Grieshaber
  • VEGAPULS 6X Two-wire PROFINET, Modbus TCP, OPC UA (Ethernet-APL)

28 Apr 2026
Published
28 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.01%

KEV

Description

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

Statistics

  • 3 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

VDE-2026-046
VEGA: Unsecured Configuration Interface Allows Unauthorized Access Leading to Privilege Escalation

Vulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.
CVE-2026-3323

certvde.com/en/advisories/vde-

vega.csaf-tp.certvde.com/.well

  • 0
  • 0
  • 2
  • 2h ago
Showing 1 to 10 of 23 CVEs