24h | 7d | 30d

Overview

  • Linux
  • Linux

22 Apr 2026
Published
03 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
2.26%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 41 Posts
  • 154 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

Le sigh. Every time we go around and have to do this again and manually figure out wtf each of the ten thousand linux distributions provides their security updates and current status.

Spending my Saturday morning searching for CVE-2026-31431 and "copyfail" patch status is just 👍.

Anyway, here's what I have so far:

  • 15
  • 14
  • 0
  • 12h ago
Profile picture fallback

Copy Fail (CVE-2026-31431) Patch Status for Debian:

- Debian Sid: Patched
- Forky: Patched
- Debian 13 Trixie: Patched
- Debian 12 Bookworm: Patched

Debian 11 Bullseye remains vulnerable.

#Debian #Copyfail #Linux #Security

  • 11
  • 13
  • 0
  • 19h ago
Profile picture fallback

Some more details from our CVE page on CVE-2026-31431 at access.redhat.com/security/cve For more infos also on availability of updates see nvd.nist.gov/vuln/detail/CVE-2 cve.org/CVERecord?id=CVE-2026- And check the errata/update/advisory pages of your distribution.

2/4

  • 6
  • 18
  • 0
  • 18h ago
Profile picture fallback

Ça y est le noyau #Linux pour #Debian 12 est sorti avec le correctif pour #CopyFail :

security-tracker.debian.org/tr

  • 3
  • 5
  • 0
  • 17h ago
Profile picture fallback

Fedora - bugzilla.redhat.com/show_bug.c
"For any Fedora users finding a link here: this was fixed in kernel 6.19.12, and all current Fedora branches are already at or past that version."

Gentoo - bugs.gentoo.org/973385

Kali - should have it by tracking Debian security

Suse / OpenSuse etc. - suse.com/security/cve/CVE-2026

RedHat - access.redhat.com/security/cve
relevant for various downstreams

#copyfail

  • 1
  • 3
  • 0
  • 12h ago
Profile picture fallback

Un kernel Linux patché est disponible pour Debian 11 (5.10.251-3), Debian 12 (6.1.170-1) et Debian 13 (6.12.85-1) : security-tracker.debian.org/tr
Pour Debian 9 et 10 il faut suivre les paquets de Freexian : deb.freexian.com/extended-lts/
#CopyFail #Debian

  • 1
  • 2
  • 0
  • 13h ago
Profile picture fallback

Linux-Kernel-Lücke CVE-2026-31431: Lokale Rechteerweiterung auf Root über algif_aead

Eine Schwachstelle im Krypto-Subsystem des Linux-Kernels erlaubt es nicht privilegierten lokalen Nutzern, Root-Rechte zu erlangen – ohne die Datei auf der Festplatte zu verändern.

all-about-security.de/linux-ke

#linux #cve

  • 1
  • 1
  • 1
  • 19h ago
Profile picture fallback

Learn how to fix Copy Fail (CVE-2026-31431) in Ubuntu and Linux Mint. Copy Fail vulnerability allows any local user gain root access on Linux.

Full details here: ostechnix.com/fix-copy-fail-cv

#Copyfail #CVE202631431 #Ubuntu #Linuxmint #Security #Linuxkernel

  • 1
  • 1
  • 0
  • 9h ago
Profile picture fallback

Because of the #copyfail cve, I booted up my MacBook Air running Linux Mint to get the patches.

copy.fail/

I took the chance to upgrade from Mint 21.3 to 22.3 too. I absolutely love how Mint has given so much extra life to the 2012 MBA.

@linuxmint

On my Pi though, DietPi is not patched yet, but I think it's waiting for Raspberry Pi's kernel or something. I don't really understand how or which party patches what!

github.com/MichaIng/DietPi/iss

#cve202631431 #Linuxmint #DietPi

  • 0
  • 5
  • 0
  • 16h ago
Profile picture fallback

« Mettez à jour le paquet du noyau de votre distribution avec une version incluant le #commit a664bf3d603d de la branche principale », expliquent les chercheurs, « la plupart des principales distributions proposent désormais ce correctif », comme #Debian (security-tracker.debian.org/tr) (Forky et Sid), #Ubuntu (ubuntu.com/security/CVE-2026-3), par exemple mais la mise en place est encore en cours chez #RedHat (access.redhat.com/security/cve) et #Suse.

Fin de l'article.

10/

#Patch #Linux #Ubuntu #CopyFail #Root #Cybersecurity #Docker #Kubernetes

  • 0
  • 2
  • 0
  • 10h ago
Profile picture fallback

Nine years in the Linux kernel and nobody noticed. "Copy Fail" (CVE-2026-31431) lets any local user grab root in seconds. CISA just added it to KEV. Working exploits for Ubuntu, Amazon Linux, RHEL, SUSE. Patch. - cisa.gov/news-events/alerts/20

  • 0
  • 2
  • 0
  • 8h ago
Profile picture fallback

@jorge bazzite is on a different machine but similarly vulnerable. It's on stable, kernel 6.19.11-ogc1.1.fc44.x86_64 and shows vulnerable to cve-2026-31431

  • 0
  • 1
  • 0
  • 23h ago
Profile picture fallback

Altro giro di aggiornamenti su vari server per #copyfail #CVE-2026-31431

  • 0
  • 1
  • 0
  • 12h ago
Profile picture fallback

I can't tell how dangerous Linux CVE-2026-31431 is, given it's just "local privilege escalation," but updating all my web servers anyway I guess 🤷🏻‍♂️

#Linux #Ubuntu

  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback

Copy Fail (CVE-2026-31431) is a Linux kernel LPE that gives root access on every major linux distro.

All that is needed is local shell access and a few lines of python.

forum.hashpwn.net/post/12727

  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback

C’est l’entreprise de sécurité Xint.io qui a révélé (xint.io/blog/copy-fail-linux-d), ce mercredi 29 avril, cette vulnérabilité (CVE-2026-31431, d’une sévérité élevée de 7,8/10) permettant une élévation des privilèges en local.

Le score n’est « que » de 7,8 car le vecteur d’attaque est local (AV:L) : il faut déjà avoir un accès local sur la machine, ici un compte utilisateur. La même avec une attaque depuis le réseau (AV:N) se serait approchée de 10.

2/

  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback

En utilisant un script Python (github.com/theori-io/copy-fail) très court (732 octets) qui ne fait appel qu’à des bibliothèques standard et ciblant le page cache du noyau, il est possible d’accéder au binaire qui permet d’être superutilisateur : /usr/bin/su. La modification se fait en mémoire, pas directement sur le périphérique de stockage.

7/

  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback

CVE-2026-31431 added to KEV.
Linux kernel vuln, active exploitation confirmed.
Patch ASAP.

Source: cisa.gov/news-events/alerts/20

💬 Thoughts?
Follow @technadu

  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback

Copy Fail: la #vulnerabilidad de #Linux que lleva 9 años escondida y permite obtener root con un script de 732 bytes

wwwhatsnew.com/2026/05/02/copy

  • 0
  • 0
  • 0
  • 6h ago

Bluesky

Profile picture fallback
Microsoft Defender has published analysis, detection insights, and mitigation recommendations for CVE-2026-31431 (also known as “Copy Fail”), a high-severity local privilege escalation vulnerability affecting multiple major Linux distributions: msft.it/6015vJcbT
  • 2
  • 6
  • 0
  • 21h ago
Profile picture fallback
CISA adds CVE-2026-31431 to KEV. Linux kernel vuln under active exploitation. 💬 Patch timelines realistic? Follow TechNadu #CyberSecurity #Linux #Infosec
  • 0
  • 1
  • 0
  • 16h ago
Profile picture fallback
CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
The latest update for #Sophos includes "Proof-of-concept exploit available for #Linux 'Copy Fail' vulnerability (CVE-2026-31431)" and "'Mini Shai-Hulud' supply chain attack targets #SAP npm packages". #cybersecurity #antivirus #malware https://opsmtrs.com/487u2e2
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
The latest update for #Tanium includes "Copy Fail (CVE-2026-31431): What #Linux administrators need to know now" and "Types of #AI agents: From simple reflex to autonomous systems". #cybersecurity #EndpointProtection #EndpointSecurity https://opsmtrs.com/3DH5Ks9
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
https://infomation-sytem-security.hatenablog.com/entry/linux-kernel-vulnerability-cve-2026-31431-copy-fail Linuxカーネルに深刻な脆弱性「Copy Fail」(CVE-2026-31431)が発見されました。 この脆弱性は、一般ユーザーがroot権限を奪取可能で、コンテナ環境では特に危険です。 パッチ適用とOS再起動、EDRによる監視強化が喫緊の対策となります。
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
https://www.ipa.go.jp/security/security-alert/2026/alert20260501.html Linuxカーネルに権限昇格の脆弱性CVE-2026-31431が確認されました。 悪用されると、ローカルユーザーが管理者権限を取得される恐れがあります。 迅速なパッチ適用や回避策の検討が必要です。
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Theori has disclosed and published a PoC exploit for a high-severity flaw in the Linux kernel affecting most distributions of Linux released since 2017. CVE-2026-31431 allows an unprivileged local attacker to elevate privileges to root by using a ten-line Python script to. #linux #flaw copy.fail
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
https://www.openwall.com/lists/oss-security/2026/04/30/10 Linuxカーネルに深刻な脆弱性CVE-2026-31431が判明しました。 ローカル権限昇格の可能性があり、修正パッチの適用が急務です。 回避策としてIPSec関連モジュールの無効化が提案されています。
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
🐧 ¿Cómo funciona '#CopyFail'? El exploit de 732 bytes que otorga acceso Root en Linux (CVE-2026-31431) (+MITIGACIÓN) www.newstecnicas.info.ve/2026/04/copy...
  • 0
  • 0
  • 1
  • 13h ago
Profile picture fallback
Copy-Fail (CVE-2026-31431): From Low-Privileged Shell to Root in Seconds https://medium.com/@ajudeb55/copy-fail-cve-2026-31431-from-low-privileged-shell-to-root-in-seconds-1b18bf525854?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
CVE-2026-31431 eBPF fix - Copy.fail
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
How to block CVE-2026-31431 (Copy Fail)
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
CopyFail Linux Kernel Zero-Day & Agentic AI Risks: Why 2026’s Patch Tsunami is Already Here + Video Introduction: The Linux kernel’s `algif_aead` module has just yielded CVE-2026-31431, dubbed “Copy Fail” – a local privilege escalation with a public exploit and CISA KEV enrollment. Simultaneously,…
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
Linux kernel LPE & DoS vulnerabilities (CVE-2026-31431 / CVE-2026-43033) affect #Debian 11 Bullseye. Detection commands, full fix script, and temporary mitigations inside. Update to kernel 5.10.251-3. 🛡️ Full guide & script Read more- > tinyurl.com/yfpvfpa8 #Security
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
01 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
28.36%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 8 Posts
  • 11 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

cPanelSniper PoC Exploit Released for CVSS 9.8 Flaw CVE-2026-41940 — 44,000 Servers Already Compromised
#CyberSecurity
securebulletin.com/cpanelsnipe

  • 5
  • 1
  • 0
  • 11h ago
Profile picture fallback

Reports: A critical cPanel & WHM zero-day (CVE-2026-41940) is being actively exploited since Feb—attackers can bypass auth to gain full admin access. Patch immediately. 🔥🔐⚠️ Read: cyberinsider.com/critical-cpan #cPanel #infosec #zeroDay #cybersecurity

  • 3
  • 0
  • 0
  • 10h ago
Profile picture fallback

cPanel CVE-2026-41940 now exploited in the wild.
Ransomware cases emerging, millions exposed.
CISA confirms active attacks.

Source: theregister.com/2026/05/01/cri

💬 Thoughts?
Follow @technadu

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture fallback
cPanel CVE-2026-41940 is being exploited now. Ransomware cases reported, massive exposure risk. 💬 Your take? Follow TechNadu #CyberSecurity #Infosec #ZeroDay
  • 1
  • 1
  • 0
  • 18h ago
Profile picture fallback
cPanelSniper Unleashed: 44,000 Servers Breached—Your Authentication Bypass Survival Guide + Video Introduction: A critical authentication bypass vulnerability (CVE-2026-41940, CVSS 9.8) in cPanel & WHM has been weaponized into a public exploit framework called "cPanelSniper." Attackers have been…
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
CATASTROPHIC: 70 Million Websites Hacked—cPanel 0-Day Lets Attackers Wipe Your Server with 5 HTTP Requests + Video Introduction: A critical authentication bypass vulnerability in cPanel & WHM, tracked as CVE-2026-41940 with a CVSS score of 9.8, is being actively exploited in the wild after being…
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
BREAKING: A critical cPanel vulnerability (CVE-2026-41940) is being mass-exploited, with at least 44,000 servers compromised worldwide and now actively used to launch further attacks.
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
The latest update for #Sentrium includes "cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)" and "ASP.NET Core Privilege Escalation Vulnerability (CVE-2026-40372)". #Cybersecurity #PenTesting #infosec https://opsmtrs.com/3aPKkxS
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture fallback

It's fair to say that <nitter.net/cperciva/status/204>, a few hours before Gary's video, was not bullshit:

" In April, FreeBSD issued eight security advisories. Six of them were for issues found by AI."

Colin Percival quotes his own post from March 2026:

"… LLMs are producing lots of slop, but they're also finding a heck of a lot of real vulnerabilities."

@seuros if you disagree with CWE-121 – the Common Weakness Enumeration (CWE™) for CVE-2026-4747 – you might contact MITRE – <cve.org/CVERecord?id=CVE-2026->.

Cc @garyhtech @cperciva@mastodon.social

@cperciva@bird.makeup (automated)

#AI #FreeBSD #vulnerability #Anthropic #Claude #Mythos #security #infosec

  • 1
  • 2
  • 0
  • 17h ago

Overview

  • wclovers
  • WCFM – Frontend Manager for WooCommerce

02 May 2026
Published
02 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
Pending

KEV

Description

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_customer' due to missing validation on the 'customerid' user controlled key. This makes it possible for authenticated attackers, with Vendor-level access and above, to delete arbitrary users, including Administrators.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

🔒 CVE-2026-2554: HIGH-severity IDOR in WCFM – Frontend Manager for WooCommerce lets Vendor+ users delete any account, incl. admins. No patch yet. Restrict Vendor access & monitor user deletions. More: radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 1h ago

Overview

  • mtrudel
  • bandit
  • bandit

01 May 2026
Published
02 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.06%

KEV

Description

Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthenticated remote denial of service via memory exhaustion. The fragment reassembly path in 'Elixir.Bandit.WebSocket.Connection':handle_frame/3 in lib/bandit/websocket/connection.ex appends every incoming Continuation{fin: false} frame's payload to a per-connection iolist with no cumulative size cap. The existing max_frame_size option only bounds individual frames; a peer that streams an unbounded number of continuation frames without ever setting fin=1 grows BEAM heap linearly until the OS or a supervisor kills the process. Because the accumulation happens before WebSock.handle_in/2 is called, the application has no opportunity to interpose a size check. Phoenix Channels and LiveView both run over WebSock on Bandit, so a stock Phoenix application exposes this surface as soon as it accepts socket connections. This issue affects bandit: from 0.5.0 before 1.11.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 21 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-42786 (HIGH): mtrudel bandit 0.5.0 – <1.11.0 lets remote attackers cause DoS via unlimited WebSocket continuation frames (resource exhaustion). Affects Phoenix Channels & LiveView. Patch pending — monitor & limit connections. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 21h ago

Overview

  • ggml-org
  • llama.cpp

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.49%

KEV

Description

llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492, the RPC backend's deserialize_tensor() skips all bounds validation when a tensor's buffer field is 0. An unauthenticated attacker can read and write arbitrary process memory via crafted GRAPH_COMPUTE messages. Combined with pointer leaks from ALLOC_BUFFER/BUFFER_GET_BASE, this gives full ASLR bypass and remote code execution. No authentication required, just TCP access to the RPC server port. This issue has been patched in version b8492.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

CVE-2026-34159: llama.cpp RPC backend has an unauthenticated, no-bounds-check RCE. Zero buffer field in deserialize_tensor() allows arbitrary memory read/write. No auth, low complexity, CVSS 9.8. Patch to b8492 immediately. #infosec #llamacpp #rce

valtersit.com/cve/2026/04/cve-

  • 0
  • 1
  • 0
  • 1h ago

Overview

  • argoproj
  • Argo CD

02 May 2026
Published
02 May 2026
Updated

CVSS v3.1
HIGH (7.7)
EPSS
0.01%

KEV

Description

In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows reading cleartext Kubernetes Secret data.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH-severity vuln (CVE-2026-43824) in Argo CD 3.2.0 – 3.2.10 & 3.3.0 – 3.3.8: ServerSideDiff leaks cleartext Kubernetes Secrets. Restrict feature use & monitor for patches. Details: radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 22h ago

Overview

  • Zyosoft
  • School App

02 May 2026
Published
02 May 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.04%

KEV

Description

School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-7491 (HIGH, CVSS 8.6): Zyosoft School App v0 is vulnerable to auth bypass via user-controlled keys (CWE-639). Authenticated users can access & modify others' data. No patch yet — restrict access & stay alert for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • GitHub
  • Enterprise Server

10 Mar 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.30%

KEV

Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.

Statistics

  • 1 Post

Last activity: 4 hours ago

Overview

  • pickplugins
  • User Verification by PickPlugins

02 May 2026
Published
02 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.06%

KEV

Description

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting a "true" OTP value.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-7458 in User Verification by PickPlugins (≤2.0.46) enables auth bypass via weak OTP checks. Attackers can log in as any verified user, including admins. No patch yet — disable or restrict plugin! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 18h ago
Showing 1 to 10 of 24 CVEs