24h | 7d | 30d

Overview

  • Linux
  • Linux

22 Apr 2026
Published
30 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 121 Posts
  • 635 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Copy Fail (CVE-2026-31431) has just been patched on Debian 13, with kernel version 6.12.85-1 from trixie (security).

security-tracker.debian.org/tr

#CopyFail #Debian #Linux #InfoSec #CVE

  • 53
  • 42
  • 0
  • 7h ago
Profile picture fallback

The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

Mitigations were extremely thin at launch, and haven't improved much, and are even brittle and misleading:

infosec.exchange/@tychotithonu

They've also largely neglected most of the value of the feedback they're getting from defenders clamoring for useful intel. The GitHub repo is full of feedback about which distros are affected or unaffected ... and a day later, none of it has been used to update the list of affected versions in the main README (except for the RHEL made-up version fix)

And this exchange is painful:

github.com/theori-io/copy-fail

"None of us are RH people so it wasn't caught" 😐 You had weeks do basic vetting, or find someone who would help you.

Theori seems to have to have intended this to be a showcase for their product. Instead, it has convinced me that I will never buy anything from them.

Edit: Will Dorman goes into more detail here, 100% agreed:
infosec.exchange/@wdormann/116

  • 45
  • 39
  • 0
  • 14h ago
Profile picture fallback

Si sois sysadmins de Linux mejor no hagáis planes para el puente... copy.fail/

#copyfail #cve_2026_31431

  • 33
  • 23
  • 0
  • 17h ago
Profile picture fallback

Mitigation to / :

- If kernel config has CONFIG_CRYPTO_USER_API_AEAD=m:

echo "install algif_aead /bin/false" | sudo tee /etc/modprobe.d/disable-algif.conf; sudo rmmod algif_aead

- If kernel config has CONFIG_CRYPTO_USER_API_AEAD=y:

Add "initcall_blacklist=algif_aead_init" to the kernel command line and reboot.

openwall.com/lists/oss-securit

  • 31
  • 23
  • 0
  • 21h ago
Profile picture fallback

Copy Fail (CVE-2026-31431) is a Linux kernel vulnerability that allows local unprivileged users to gain root access on affected systems.
linuxiac.com/copy-fail-linux-k

#linux #kernel #opensource

  • 18
  • 11
  • 0
  • 13h ago
Profile picture fallback
  • 15
  • 13
  • 0
  • 20h ago
Profile picture fallback

As people rightly highlight that the #CopyFail fix status in various #Linux distros is… confusing, it’s worth keeping in mind you can deploy the workaround everywhere with no side effects:

# echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
# rmmod algif_aead 2>/dev/null || true

By ‘confusing’ I mean:

  • 11
  • 2
  • 0
  • 22h ago
Profile picture fallback

Критическая уязвимость!
(linux)
Почти любой дистро уязвим

CVE-2026-31431 (copyfail)

Чел с доступом к терминалу (любой юзер) может получить рут

Тестировать можно этим кодом
github.com/theori-io/copy-fail

обновляйтесь быстро!
И репостните чтоб не проспали люди. Тыкните друзей кто линуксоид

#opsec #infosec #linux #vulnerability

  • 9
  • 1
  • 0
  • 7h ago
Profile picture fallback

copy.fail (CVE-2026-31431) explained: a small Linux kernel bug with an unusually big blast radius

jorijn.com/en/blog/copy-fail-c

#Linux #CyberSecurity #CVE #copyfail #jorijncom

  • 8
  • 8
  • 0
  • 15h ago
Profile picture fallback

The GitHub issues for the copyfail PoC script are fun, including this one, aptly titled "Golf Harder": github.com/theori-io/copy-fail

#copyfail #codegolf

  • 8
  • 6
  • 0
  • 11h ago
Profile picture fallback

RE: mastodon.social/@Viss/11649054

From my reading, this is my understanding as well. You don't have to have root, and you can modify anything in the page cache. Like ... sshd, or libpam, or anything called by a cron job that's running as root.

How can we definitively confirm this?

  • 7
  • 8
  • 0
  • 13h ago
Profile picture fallback

copy.fail/

Local Privilege Escalation in every Linux kernel since 2017

Hopefully no one is sitting on a low-privilege RCE...

  • 7
  • 4
  • 0
  • 21h ago
Profile picture fallback

Raspberry Pi folks worried about CVE-2026-31431 'copy fail'.

Add this to the end of the line in /boot/firmware/cmdline.txt

initcall_blacklist=algif_aead_init

Then reboot with sudo systemctl reboot.

Check that it worked with

dmesg | fgrep 'blacklisting initcall algif_aead_init'

expect to see

[ 0.000000] blacklisting initcall algif_aead_init

You're now good against this issue.

#raspberrypi

  • 6
  • 3
  • 0
  • 14h ago
Profile picture fallback

Linux Kernel Zero-Day “Copy Fail” (CVE-2026-31431) Grants Root Access on Every Major Distro Since 2017
#CyberSecurity
securebulletin.com/linux-kerne

  • 5
  • 1
  • 0
  • 12h ago
Profile picture fallback

Copy Fail (copy.fail/, CVE-2026-31431) is a good reminder why I don’t want to run CI jobs only in containers.

It would be great to get some momentum to code.forgejo.org/forgejo/forge (microVMs for forgejo actions). At least on bare metal (or nested VMs with nested KVM) this would make things a lot safer. It would also simplify the usage of containers/docker in CI jobs without compromising security, which is kind of a pain with Codeberg Action currently.

#security

  • 4
  • 4
  • 2
  • 21h ago
Profile picture fallback

No official announcement yet, but Copy Fail (CVE-2026-31431) has already been fixed in the Fedora kernels: 6.19.12. According to Red Hat / Fedora kernel tracking, "all current Fedora branches are already at or beyond kernel 6.19.12.

TL;DR - If your Fedora system is fully updated, you are already protected against Copy Fail.

#Fedora #Linux #LinuxAudio #CopyFail

  • 4
  • 3
  • 0
  • 4h ago
Profile picture fallback

On se marre bien aujourd'hui, avec CVE-2026-31431

Et la faille est encore plus drôle qu'il me semble bien que sur RedHat 8 et 9 et leurs cousines, “algif_aead” est compilé en statique bien dur dans le noyau et n'est donc pas un module qu'on peut blacklister en contournement 👌🥳

copy.fail

  • 3
  • 1
  • 0
  • 18h ago
Profile picture fallback
  • 3
  • 1
  • 0
  • 17h ago
Profile picture fallback

Researchers disclose "Copy Fail": a Linux privilege-escalation (CVE-2026-31431) where a 732‑byte Python PoC grants local root and affects major distros since 2017; kernel patches are available—temporary mitigation: block AF_ALG / blacklist algif_aead. Full report: heise.de/en/news/Copy-Fail-Lin 🔒🐧 #Linux #infosec

1/2 Fix bellow

  • 3
  • 1
  • 0
  • 11h ago
Profile picture fallback

CRITICAL Vulnerability!

Almost any linux distro is vulnerable!

CVE-2026-31431 (copyfail)

any user with any access to terminal can get root

Test with this code
github.com/theori-io/copy-fail

Update! And repost pls. Damn, thats fucked up.

#opsec #infosec #linux #vulnerability

  • 3
  • 1
  • 0
  • 7h ago
Profile picture fallback

PSA for sysadmins: master.almalinux-org.pages.dev

TL;DR anyone with an unpriviledged shell can become root with a small exploit. One mean fucker, so be sure to update ASAP once available if you're within blast radius.

#sysadmin #Linux #psa #cve

  • 2
  • 4
  • 0
  • 17h ago
Profile picture fallback

#linux #kernel #exploit - I completely missed this one:

bugcrowd.com/blog/what-we-know

Privilege escalation on all linux kernels since 2017. And I cannot even see if my current ubuntu kernel has a patch for it...

Gotta sign up on some more security accounts here!

  • 2
  • 1
  • 0
  • 21h ago
Profile picture fallback

Die Entdecker nennen die Lücke "Copy Fail": Ein 732-Byte-Python-Exploit erlaubt lokalen Root-Zugriff auf viele Linux-Distributionen seit 2017. CVE-2026-31431 (CVSS 7.8). Update-Kernel dringend empfohlen; Workarounds: algif_aead blacklisten / seccomp. 🔓🐧⚠️ #Linux #Cybersecurity #CVE2026-31431 heise.de/news/Copy-Fail-Linux-

1/2 Fix bellow

  • 2
  • 1
  • 0
  • 11h ago
Profile picture fallback

The fix for the wild CVE (CVE-2026-31431) is out for #Ubuntu
You should apply it *now*

  • 2
  • 1
  • 0
  • 8h ago
Profile picture fallback

CopyFail (CVE-2026-31431) ist eine kritische Sicherheitslücke im Linux-Kernel. Sie ermöglicht es einem lokalen Angreifenden ohne Administratorrechte, sich vollständigen Root-Zugriff auf das System zu verschaffen.

Mehr: maniabel.work/archiv/1520
#LinuxKernel #CopyFail #Exploit #BeDiS #up2date

  • 2
  • 1
  • 0
  • 7h ago
Profile picture fallback

Oof, an undiscovered zero-day in the Linux kernel discovered that affects every distribution since 2017 and it's being called Copy Fail which can authenticate non-root users with a normal local account.

bugcrowd.com/blog/what-we-know

thehackernews.com/2026/04/new-

  • 2
  • 0
  • 0
  • 14h ago
Profile picture fallback

Un kernel patché est dispo pour #Debian 13 (Trixie security) : security-tracker.debian.org/tr #CopyFail

  • 2
  • 0
  • 0
  • 7h ago
Profile picture fallback

@maddiefuzz Yes it is security-tracker.debian.org/tr but that's ok, vulnerabilities happen :).

The toot was more about the calm and demure aspect of admin-ing a Debian and using it for development. I've found it tends to pay off to learn a distro and stick with it 🤓. Debian as a desktop/dev environment is also a fantastic option

  • 1
  • 5
  • 0
  • 11h ago
Profile picture fallback

So, copy.fail was found with one hour of AI assistance, and would (according to this article) have earned $500K on the open market not too long ago.

bugcrowd.com/blog/what-we-know

I'm no security researcher, but this kind of contradicts all those people who said that the OpenBSD bug that Mythos found (for $20K of compute) was just fancy fuzzing, and the only reason it was there was that nobody was investing 20K in OpenBSD security and the security threat of modern AI was all hype.

  • 1
  • 1
  • 0
  • 18h ago
Profile picture fallback

@LaurentChemla

Good explanation [1] including "For immediate mitigation" (consistent with most other descriptions on how to immediately prevent the exploit while waiting for your distribution to fix it properly).

Debian security tracker [2].

#cve_2026_31431 #CVE_2026_31431

[1] xint.io/blog/copy-fail-linux-d

[2] security-tracker.debian.org/tr

  • 1
  • 1
  • 0
  • 18h ago
Profile picture fallback
  • 1
  • 0
  • 0
  • 21h ago
Profile picture fallback

むー?まずいか?
Linuxカーネルの脆弱性「CopyFail (CVE-2026-31431)」をEC2のUbuntu 22.04で実証してみた
https://zenn.dev/aeyesec/articles/7e4a1e3c83e81b

  • 1
  • 0
  • 1
  • 19h ago
Profile picture fallback

:nugget: CVE-2026-31431 copy.fail/

I cannot believe this 0day happened a few days after I updated everything... good news is.. I can update with zero downtime for the most part.

If you notice a small outage, it should take a minute at max but I'll try to keep it small.

  • 0
  • 5
  • 0
  • 2h ago
Profile picture fallback

The copy.fail/ website for the Linux CVE CVE-2026-31431 reeks of AI and is absolutely distasteful with its boasting about the severity and explainers that have no clear target audience

  • 0
  • 3
  • 0
  • 10h ago
Profile picture fallback

@chuso Probably worth mentioning the related bug on #Gentoo Bugzilla.

bugs.gentoo.org/show_bug.cgi?i

Looks like @thesamesam is well and truly onto it.

Also for #Debian users, at the moment they're working on fixes: security-tracker.debian.org/tr

Edit: Nothing seen on the #AlpineLinux front, I guess we'll hear from @alpinelinux in due course.

  • 0
  • 2
  • 0
  • 19h ago
Profile picture fallback

Copy-fail-CVE-2026-31431 is the best #bug I've ever seen, just test it and it works, I got to be #root

I'm amazed

#copy-fail #exploit #linux

  • 0
  • 2
  • 0
  • 15h ago
Profile picture fallback

No warranty implied, use at your own risk. But this short C program can check if your Linux machine is still vulnerable to Copy Fail (there's also this page with python code from our friends in Estonia docs.hpc.ut.ee/public/cve-2026 )

Output includes "ARE available" or "NOT available"

Again: compile and run at your own risk. Don't just trust me blindly. Read the code. #CopyFail #CVE-2026-31431
==============

#include <stdio.h>
#include <string.h>
#include <errno.h>
#include <unistd.h>
#include <sys/socket.h>
#include <linux/if_alg.h>

int main(void) {
int sock;
struct sockaddr_alg sa;

// Prepare sockaddr_alg for AEAD/GCM
memset(&sa, 0, sizeof(sa));
sa.salg_family = AF_ALG;
strcpy((char *)sa.salg_type, "aead");
strcpy((char *)sa.salg_name, "gcm(aes)");

// Try to create AF_ALG socket
sock = socket(AF_ALG, SOCK_SEQPACKET, 0);
if (sock == -1) {
perror("socket(AF_ALG, aead)");
printf("algif_aead functions are NOT available (AF_ALG socket creation failed).\n");
return 1;
}

// Try to bind to AEAD/GCM
if (bind(sock, (struct sockaddr *)&sa, sizeof(sa)) == -1) {
perror("bind(AF_ALG, aead, gcm(aes))");
printf("algif_aead functions are NOT available (bind failed).\n");
close(sock);
return 1;
}

printf("algif_aead functions ARE available (AF_ALG AEAD bind succeeded).\n");
close(sock);
return 0;
}

  • 0
  • 2
  • 0
  • 10h ago
Profile picture fallback

So this tiny piece of Python code is responsible for Copy Fail (CVE-2026-31431)? I am considering testing this on one of my own machines to see if the exploit actually works. If it does, I will post a follow-up to warn others.

#Linux #CopyFail

  • 0
  • 2
  • 0
  • 8h ago
Profile picture fallback

For testing the Linux vulnerability (recently disclosed as "Copy Fail CVE-2026-31431"), I booted my notebook computer up with a live DVD, so the exploit I am testing should not get saved to the machine.

Will Linux Mint 21.2 succumb to the exploit?

My reply shows the result....

#Linux #LinuxMint #CopyFail #malware

  • 0
  • 2
  • 0
  • 4h ago
Profile picture fallback

@fanf42 → lets an unprivileged local user write into the page cache and obtain root
CVE-2026-31431, no score yet at NIST

  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback

Toch altijd wel knap wat hackers weten te vinden.

'Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017.'

"Copy Fail — CVE-2026-31431"

copy.fail/

  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback

OhMyDebn 3.6.3 now available with Copy Fail CVE-2026-31431 exploit mitigation, OpenCode 1.14.30, and Aether 4.15.3!

OhMyDebn is a debonair Linux desktop for power users. It gives you the stability of the Debian distro, the ease of use of the Cinnamon desktop, and the power of AI, containers, and virtualization.

  • 0
  • 1
  • 0
  • 16h ago
Profile picture fallback

linux kernel question regarding #copyfail CVE-2026-31431 I just tested a c version of the exploit (github.com/tgies/copy-fail-c) on a riscv64 linux 5.10.4 (milkv-duo) and get
```
[+] target: /bin/su
[+] payload: 2064 bytes (516 iterations)
socket(AF_ALG): Address family not supported by protocol
patch_chunk failed at offset 0
```

I tested it on another risc64 SBC with a newer kernel which gained root but it seems like the exploit doesn't work on this kernel.

I'll do some more digging #riscv #milkv

  • 0
  • 1
  • 0
  • 16h ago
Profile picture fallback

Copy Fail (CVE-2026-31431) is a severe logic flaw in the Linux kernel affecting almost every distribution since 2017. Patch your system immediately!

More details here: ostechnix.com/copy-fail-cve-20

#Copyfail #CVE202631431 #Pagecache #Linuxkernel #LinuxPrivilegeEscalation #Security #XintCode #TaeyangLee

  • 0
  • 1
  • 0
  • 13h ago
Profile picture fallback

@isabel lest anyone get the wrong impression, NixOS is not immune in general github.com/theori-io/copy-fail

  • 0
  • 1
  • 0
  • 13h ago
Profile picture fallback

Xint Code disclosed CopyFail (CVE-2026-31431) Wednesday. A logic bug in algif_aead, the kernel's crypto socket layer, from a 2017 in-place optimization. Nine years on every major Linux distribution. The exploit is 732 bytes of Python. No offsets, no race window. Static analysis missed it. Fuzzing missed it. AI-assisted review caught it. Rust would not have, this is logic, not memory. The Rust-versus-C debate distracted from where logic bugs actually live.

#Linux #InfoSec #OpenSource #Kernel

  • 0
  • 1
  • 0
  • 11h ago
Profile picture fallback
  • 0
  • 1
  • 0
  • 12h ago
Profile picture fallback

Is ubuntu.com down for anyone else? Wanted to check for fix information at ubuntu.com/security/CVE-2026-31431
?

  • 0
  • 1
  • 0
  • 7h ago
Profile picture fallback

@rysiek there's the deobfuscated python code in a GitHub issue: github.com/theori-io/copy-fail

My guess is that they compressed it so they can get it down to the 732 byte size, as if anyone really cares about that these days.

  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback

For those wondering when #Debian will have patches for #CopyFaill, I've been following this page:

security-tracker.debian.org/tr

Trixie just got patched. Still waiting for Bookworm.

  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback

It would be interesting to see whether the copy-fail vuln (CVE-2026-31431) could be used to root an Android phone. I am a bit reluctant to install Magisk on my primary Android device, would love to see if the vuln could be an alternative. Lmao.

  • 0
  • 1
  • 0
  • 3h ago
Profile picture fallback

It's crazy that the researchers who discovered Copy Fail only worked with the Linux Kernel Organization to patch it in the mainline kernel but didn't work with any of the major distros to make sure a patch was available before disclosing the exploit. Unless you're running a rolling distro, a dev version or a distro with short release windows, it's effectively an unpatched zeroday.

The ones most vulnerable to this are the type of systems that run on long term release kernels, not rolling releases or short release distros like Fedora.

This whole saga is a big clusterfuck for the Linux community to scramble to patch this major flaw.

#Linux #CopyFail #CVE_2026_31431 #infosec #cybersec

RE: https://infosec.exchange/@BleepingComputer/116493995434262191

  • 0
  • 1
  • 0
  • 1h ago
Profile picture fallback

I'm not sure if this will help and I haven't been able to test all of these yet (just don't have everything set up for it), but I've tried to put out some detections for #cve-2026-31431 for Wazuh, Auditd and MISP and YARA items.

Mileage will vary on this until it can be tested a bit more thoroughly. Please feel free to drop a PR if you have better updates to what's here.

github.com/insomnisec/Detectio

#cyber #linux #lpe #vulnerability #cve

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

CVE-2026-31431 #copyfail Tetragon Tracing Policy - Kill unprivileged aead_recvmsg. This is the low-level customization of configuration policies your #Linux EDR should have. Also, watch out for processes running NULL argv gist.github.com/cr0nx/3079c573

  • 0
  • 0
  • 1
  • 23h ago
Profile picture fallback
CopyFail (CVE-2026-31431) — a 732-byte Python script that roots every Linux distro shipped since 2017. 🧵
https://x.com/i/status/2049533584097362272
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback

@giggls Verdammt, ja. Das ist die richtige ID:
euvd.enisa.europa.eu/vulnerabi

Die Bezeichnungen bei den Europäern sind irritierend. Warum müssen die eigene Nummern vergeben?
"EUVD-2026-24639"

  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback

@fooflington ich bins grade.
security-tracker.debian.org/tr
Einfach mal nen poc (nicht überprüft) raushauen ohne responsible disclosure fürn maximalen fame um den eigenen KI scanner zu promoten.

  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback

Me: Nothing bad ever happened on Wednesdays. I should be able to relax.
CopyFail:

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

so what do I even do at this point. the patch for CVE-2026-31431 isn't out yet on debian stable and the only fixes I see are to recompile the kernel which I have zero idea how to do

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

[VULN] ⚠️"Copy Fail - Une IA trouve la faille Linux que personne n'a vue"
" * Copy Fail (CVE-2026-31431) est une faille Linux qui permet de passer de simple utilisateur à root en 732 octets, affectant la quasi-totalité des kernels non patchés depuis 2017, découverte par une IA en une heure.

  • La faille exploite une optimisation de 2017 dans le sous-système crypto qui laisse un fichier en lecture seule accessible en zone modifiable, permettant de modifier progressivement un binaire système via l'appel splice().
  • Deux solutions de protection existent : patcher le kernel via la distro ou désactiver le module algif_aead (ou bloquer le sous-système crypto via seccomp si le module est intégré en dur)."👇 korben.info/copy-fail-faille-k

Demo / exploit ( via @bortzmeyer )
👇
bortzmeyer.org/copyfail.html

🔍
⬇️
vulnerability.circl.lu/vuln/CV

💬
⬇️
infosec.pub/post/45735124

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

Copy Fail (CVE-2026-31431): 732 bajty do przejęcia kontroli nad systemem ( nfsec.pl/security/6718 )

youtube.com/watch?v=-RuJTJga2fU

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

Can someone explain to me why was still unpatched on so many distros this morning when the blog post claims it was reported over a month ago to the kernel security team?

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

copy-fail-CVE-2026-31431/copy_fail_exp.py at main · theori-io/copy-fail-CVE-2026-31431 · GitHub

github.com/theori-io/copy-fail

  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback

@hillu@infosec.exchange It is my understanding that this will not work. There is a published exploit (https://github.com/rootsecdev/cve_2026_31431/blob/main/exploit_cve_2026_31431.py) that messes with the page cache for /etc/passwd to simply show your user id as 0, so a normal call to su will make you root.

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

@ubuntu Can you share when the updated packages to mitigate are likely to drop?

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

Copy-fail: local privilege escalation in every Linux distro since 2017.

It is local, but shockingly easy to exploit.

copy.fail/

Exploit: github.com/theori-io/copy-fail

HackerNews: news.ycombinator.com/item?id=4

#cve202631431 #CopyFail

  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback

So... dealing with CVE-2026-31431 and I'm annoyed:

- I see vulnerable kernel versions in Debian, but MY kernel (as "uname -sr" tells me) is different
- yet my kernel on the system I tested was clearly faulty, as the exploit worked (and then didn't work when I employed the workaround)

So I need this workaround at least for now until a new kernel comes out (and I probably still won't let algif_aead insert after that anyway)

  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback

CVE-2026-31431 - crypto: algif_aead - Revert to operating out-of-place

🔗 vulnerability.circl.lu/vuln/CV

  • 0
  • 0
  • 1
  • 13h ago
Profile picture fallback

📰 Critical 'Copy Fail' Linux Flaw (CVE-2026-31431) Gives Instant Root on Major Distros

⚠️ Critical 'Copy Fail' Linux flaw (CVE-2026-31431) allows any local user to get instant root access! Affects distros since 2017 like Ubuntu, Debian, RHEL. A simple, reliable exploit exists. Patch now! #Linux #CyberSecurity #LPE

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback

Also, doesn't the OS prioritize not flushing some files from the page cache, such as the "hottest" files? Could this be leveraged by the attacker to maximize persistence? Or even take steps to ensure the file is always in cache, like regularly reading it or something?

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

Hot new Linux vuln just dropped:
copy.fail/
CVE-2026-31431

Root access & container escape

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

Copy Fail Linux vuln allows root access

Yesterday, Theori disclosed CVE-2026-31431, dubbed Copy Fail, a Linux kernel vulnerability that allows any unprivileged local user to gain root access on virtually every major Linux distribution shipped since 2017. In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data.

itnerd.blog/2026/04/30/copy-fa

  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback

HOLY... this 'Copy fail' (#CVE202631431) is BAD news everyone...

This can provide ANY user on a GNU/#Linux system with #root access.

Also, a web-server injection script with payload is easily manufactured and delivered...

xint.io/blog/copy-fail-linux-d

#copyfail #it #cve #security #linux #foss #opensource

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

Let me be clear, I am not shocked that the CERT-EU article for CVE-2026-31431 has mitigation steps, while most others still haven’t acknowledged it sufficiently. cert.europa.eu/publications/se

  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
[ Does copy fail (CVE-2026-31431) affect android devices? : r/androidroot ]
https://www.reddit.com/r/androidroot/comments/1szlzjj/does_copy_fail_cve202631431_affect_android_devices/
you cant access af_alg on non root
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback

Checking the #CopyFail #CVE_2026_31431 status on #AlpineLinux, again nothing heard officially from @alpinelinux but I did see this:

github.com/theori-io/copy-fail

Maybe the issue has been quietly dealt with or was never an issue to begin with? It'd be nice to know for certain.

  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

Linux computers, even fully patched, are vulnerable to the "Copy Fail CVE-2026-31431" exploit.

A temporary fix is shown on askubuntu.com.

askubuntu.com/questions/156625

#CopyFail #Security #Linux

  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback

En las últimas 24 horas se han detectado vulnerabilidades críticas que afectan sistemas Linux, cPanel, routers de Solana y Adobe Acrobat, exponiendo a usuarios a escalada de privilegios, suplantación de autenticación, robo de tokens y ejecución remota de código; además, se reportan fallos en Cloudflare y un malware avanzado que amenaza sectores científicos. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 30/04/26 📆 |====

🔒 COPY FAIL — 732 BYTES TO ROOT

Se ha descubierto una vulnerabilidad crítica en Linux (CVE-2026-31431) que permite escalar privilegios a nivel root sin riesgo de condiciones de carrera ni necesidad de usar offsets. Esta falla evade las herramientas de integridad de archivos en disco y afecta incluso a entornos aislados como contenedores, representando un riesgo grave para la seguridad de sistemas Linux. Detectada por Xint Code, es esencial actualizar y proteger su infraestructura cuanto antes. Descubre más sobre esta vulnerabilidad y su impacto aquí 👉 djar.co/3ckGrI

🌐 LA INTERNET ESTÁ CAYENDO, CAYENDO, CAYENDO (CVE-2026-41940 EN CPANEL Y WHM)

Una falla de suplantación de autenticación ha sido identificada en cPanel y WHM, dos herramientas clave para la gestión de hosting. Esta vulnerabilidad permite a atacantes no autenticados obtener sesiones de usuario, inclusive con privilegios de administrador root, mediante un bypass completo en la autenticación. La amenaza compromete la seguridad de miles de servidores web, por lo que se recomienda aplicar los parches disponibles de inmediato. Infórmate sobre cómo proteger tus sistemas aquí 👉 djar.co/ScQtAV

🔗 VULNERABILIDAD EN EL ROUTER DE SOLANA

Importantes fallos de seguridad han sido detectados en el enrutador de la red Solana, facilitando el drenaje de cuentas de tokens y poniendo en riesgo la integridad de las transacciones financieras dentro de esta blockchain. Estas vulnerabilidades críticas podrían comprometer fondos y confianza en la plataforma, por lo que es imprescindible que los usuarios y desarrolladores tomen medidas urgentes para mitigar estos riesgos. Detalles y recomendaciones aquí 👉 djar.co/2clAA

📄 TRES VULNERABILIDADES EN ADOBE ACROBAT QUE COMPROMETEN SEGURIDAD

Adobe ha revelado tres vulnerabilidades críticas (CVE-2026-34621, CVE-2026-34622, CVE-2026-34626) que permiten la ejecución remota de código y la filtración de información mediante archivos PDF maliciosos. Estos fallos afectan versiones populares como Acrobat DC y Reader DC, poniendo en riesgo a millones de usuarios que manejan documentos digitales. Actualizar a la última versión es fundamental para evitar intrusiones y pérdidas de datos. Conoce los detalles y actualizaciones disponibles aquí 👉 djar.co/Rvvu5

🏛️ LA ESTRATEGIA DEL CONGRESO CONTRA BLOQUEOS MASIVOS DE IP POR LALIGA

El Congreso ha aprobado una reforma a la Ley de Servicios Digitales para evitar bloqueos masivos de direcciones IP que afecten a páginas ajenas en procesos contra la piratería, buscando un equilibrio entre la protección de derechos y la seguridad en internet. Esta medida evita que resoluciones judiciales derriben sitios web de terceros y promueve un entorno digital más seguro y regulado. Entiende el alcance y las implicaciones de esta reforma aquí 👉 djar.co/8dbV

☁️ VULNERABILIDADES CRÍTICAS EN LA IMPLEMENTACIÓN DE CLOUDFLARE

Se han reportado vulnerabilidades en los proxies de autorización y archivos PAC alojados por Cloudflare que afectan la gestión de políticas de seguridad de identidad sin necesidad de clientes en dispositivos finales. Estas fallas, aunque técnicas, representan un avance en cómo se protegen las redes y requieren atención para evitar posibles explotaciones. Mantente informado sobre cómo estas vulnerabilidades impactan la seguridad del entorno web aquí 👉 djar.co/Y6uR

🐛 DETECTANDO LA AMENAZA DEL MALWARE FAST16

Un malware avanzado, posiblemente desarrollado o patrocinado por un estado, ha sido identificado causando sabotajes discretos mediante la manipulación de programas matemáticos y simulaciones físicas. Esta amenaza tiene potencial para generar fallos graves, afectando sectores científicos y tecnológicos sensibles. La detección y respuesta temprana son claves para mitigar el daño. Aprende cómo proteger tus sistemas frente a Fast16 aquí 👉 djar.co/CN8X

  • 2
  • 1
  • 0
  • 17h ago

Bluesky

Profile picture fallback
Nouvelle faille de secu dans le kernel Linux depuis 2017 la veille d'un gros week-end : copy fail ou CVE-2026-31431 Un script python de 732 bits permet une élévation de privilège copy.fail
  • 15
  • 30
  • 0
  • 20h ago
Profile picture fallback
🚨 Copy Fail (CVE-2026-31431) Linux kernel LPE → page cache corruption → overwrite binaries → root. Public PoC dropped ~24h ago. Tested: ✔ Ubuntu 24.04 / 25.10 (x86_64 + ARM64) If you get code execution → you get root. PoC: github.com/pascal-gujer... #linux #infosec
  • 2
  • 3
  • 0
  • 20h ago
Profile picture fallback
Copy Fail (CVE-2026-31431) is a Linux kernel vulnerability that allows local unprivileged users to gain root access on affected systems. linuxiac.com/copy-fail-li... #Linux #Kernel #OpenSource
  • 1
  • 5
  • 0
  • 13h ago
Profile picture fallback
うーん、PoC まで公開されてんのか。ローカルから権限昇格できるだけだから直ちに影響はないのかも知れないがめちゃくちゃ怖いな。まあうちは使われてなかったので影響はないだろうが対策しておいたほうがよさそうか 「Copy Fail」CVE-2026-31431 — 9年間潜んでいた732バイトPythonでLinuxがroot化される脆弱性と対策|zephel01
  • 1
  • 0
  • 0
  • 7h ago
Profile picture fallback
「Copy Fail」CVE-2026-31431 — 9年間潜んでいた732バイトPythonでLinuxがroot化される脆弱性と対策|zephel01 https://note.com/zephel01/n/n7fa6564b43cf
  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback
The “Copy Fail” flaw (CVE-2026-31431) allows local attackers to gain root access on Linux kernels since 2017 via a controlled 4-byte write to page cache using AF_ALG and splice. #LinuxKernel #LocalExploit #USA
  • 0
  • 1
  • 0
  • 12h ago
Profile picture fallback
Copy Fail: Public PoC and Full Details Disclosed for the 732-Byte Linux Root Exploit (CVE-2026-31431) https://securityonline.info/linux-kernel-copy-fail-root-exploit-poc-public-disclosure/
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Разработчиците на Xint Code – средство за сигурност, базирано на алгоритми с изкуствен интелект откриха в ядрото на Linux и съответно, в повечето популярни дистрибуции опасна уязвимост, която получи името Copy Fail и обозначението CVE-2026-31431...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
❗CVE-2026-31431 „Copy Fail“: Wir haben die Schwachstelle bewertet und Schutzmaßnahmen umgesetzt. Das betroffene Kernel-Modul wurde deaktiviert und entladen, der Page Cache geleert. Kein Neustart nötig, keine geplante Downtime für Kundensysteme.
  • 0
  • 0
  • 1
  • 19h ago
Profile picture fallback
Copy Fail (CVE-2026-31431): The 732‑Byte Python Script That Has Owned Every Linux Since 2017 + Video Introduction: A deterministic logic flaw silently introduced into the Linux kernel in 2017 has just been publicly disclosed as “Copy Fail” (CVE-2026-31431). Attackers with access to any…
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Wer ein Linux betreibt, auf dem viele Nutzer ein Konto haben, sollte bzgl. der #CopyFail Schwachstelle CVE-2026-31431 reagieren. borncity.com/blog/2026/04...
  • 0
  • 0
  • 1
  • 18h ago
Profile picture fallback
📢 CVE-2026-31431 ' Copy Fail ' : escalade de privilèges root en 732 octets sur toutes les distributions Linux majeures 📝 ## 🔍 … https://cyberveille.ch/posts/2026-04-30-cve-2026-31431-copy-fail-escalade-de-privileges-root-en-732-octets-sur-toutes-les-distributions-linux-majeures/ #AF_ALG #Cyberveille
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
CVE-2026-31431 (Copy Fail) detection toolkit — auditd, eBPF, Sigma, YARA
  • 0
  • 0
  • 1
  • 17h ago
Profile picture fallback
Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431) 📖 Read more: www.helpnetsecurity.com/2026/04/30/c... #cybersecurity #cybersecuritynews #containers #PoC #Linux
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
~Certeu~ Unpatched 'Copy Fail' LPE flaw (CVE-2026-31431) in Linux kernel allows root access; PoC available. - IOCs: CVE-2026-31431 - #CVE202631431 #Linux #ThreatIntel
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
GitHub - iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail: Rust implementation Exploit/PoC of CVE-2026-31431-Linux-Copy-Fail, allow executing customized shellcode (such as Meterpreter).
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
We are aware of the recently disclosed copy.fail vulnerability (CVE-2026-31431) and want to assure our customers that Upsun systems are not affected. The module targeted by this vulnerability is disabled in our platform. There is no risk of exploitation, and no action is required on your part. ✨ 1/3
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Copy Fail #Linux Kernel Flaw Allows Local Users to Gain Root Copy Fail (CVE-2026-31431) is a Linux kernel vulnerability that allows local unprivileged users to gain root access on affected systems.
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
🐧 ¿Cómo funciona 'Copy Fail'? El #exploit de 732 bytes que otorga acceso #Root en #Linux (CVE-2026-31431) (+MITIGACIÓN) www.newstecnicas.info.ve/2026/04/copy...
  • 0
  • 0
  • 1
  • 8h ago
Profile picture fallback
Copy Fail - Linux bug (CVE-2026-31431) #appsec
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
SIOSセキュリティブログを更新しました。 Linux Kernelのローカルユーザによる権限昇格の脆弱性(Copy Fail: CVE-2026-31431) #security #vulnerability #セキュリティ #脆弱性 #linux #kernel #copyfail security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
今日のZennトレンド Linuxカーネルの脆弱性「CopyFail (CVE-2026-31431)」をEC2のUbuntu 22.04で実証してみた Linuxカーネルの脆弱性CopyFail (CVE-2026-31431) についての解説記事です。 一般ユーザーがページキャッシュを汚染することで、容易にroot権限を奪取できることを実証しています。 ディスク上のバイナリは書き換わらないため検知が困難であり、確認にはキャッシュとディスクのハッシュ比較が必要です。 対策として早急なパッチ適用が推奨されています。
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
Patch Your Kernel NOW: 732byte Python rootkit, cracks all distros since 2017 https://github.com/rootsecdev/cve_2026_31431
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
The flaw (CVE-2026-31431) stems from a logic bug in the kernel's cryptographic template, and a publicly available 732-byte exploit makes it highly reliable to execute. Major distributions have begun shipping patches. Source: BleepingComputer
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
01 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
16.52%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 20 Posts
  • 25 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

An authentication bypass security issue has been identified in the cPanel software (including DNSOnly) affecting all versions after 11.40.

This one is ugly, folks. Go update your servers now, and run the detection script.

support.cpanel.net/hc/en-us/ar

#Webhosting #cPanel #WHM

  • 2
  • 1
  • 0
  • 22h ago
Profile picture fallback

'The Internet is falling down': Critical cPanel CRLF injection vulnerability puts tens of millions of websites at risk of total compromise – hosting providers urged to apply CVE-2026-41940 patch immediately
techradar.com/pro/security/the

Posted into The Dark Side of the Internet @the-dark-side-of-the-internet-rhudaur

  • 1
  • 0
  • 0
  • Last hour
Profile picture fallback

After the last bit of #cPanel news, I checked my own shared #WebHosting account to find that they have indeed followed the recommendations offered for a temporary fix and disabled all the admin port numbers for the console.

No sites are down, and email is working as expected... so it's just a matter of waiting for all of the fixes to roll out.

If you're a cPanel user and haven't yet checked accessibility and whether you've been upgraded, you might want to take a look.

support.cpanel.net/hc/en-us/ar

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

cPanel shipped an emergency patch Tuesday for CVE-2026-41940 (CVSS 9.8) with active exploitation. Watchtowr posted a working proof-of-concept Wednesday. cpsrvd writes the session file to disk before checking the password. Inject CRLF bytes through the auth header, unsanitized data lands inside, user=root sticks, login proceeds as admin. Pre-auth file writes that store attacker data are a recurring pattern across hosting panels, not an edge case.

#InfoSec #CyberSecurity #WebDev

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

En las últimas 24 horas se han detectado vulnerabilidades críticas que afectan sistemas Linux, cPanel, routers de Solana y Adobe Acrobat, exponiendo a usuarios a escalada de privilegios, suplantación de autenticación, robo de tokens y ejecución remota de código; además, se reportan fallos en Cloudflare y un malware avanzado que amenaza sectores científicos. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 30/04/26 📆 |====

🔒 COPY FAIL — 732 BYTES TO ROOT

Se ha descubierto una vulnerabilidad crítica en Linux (CVE-2026-31431) que permite escalar privilegios a nivel root sin riesgo de condiciones de carrera ni necesidad de usar offsets. Esta falla evade las herramientas de integridad de archivos en disco y afecta incluso a entornos aislados como contenedores, representando un riesgo grave para la seguridad de sistemas Linux. Detectada por Xint Code, es esencial actualizar y proteger su infraestructura cuanto antes. Descubre más sobre esta vulnerabilidad y su impacto aquí 👉 djar.co/3ckGrI

🌐 LA INTERNET ESTÁ CAYENDO, CAYENDO, CAYENDO (CVE-2026-41940 EN CPANEL Y WHM)

Una falla de suplantación de autenticación ha sido identificada en cPanel y WHM, dos herramientas clave para la gestión de hosting. Esta vulnerabilidad permite a atacantes no autenticados obtener sesiones de usuario, inclusive con privilegios de administrador root, mediante un bypass completo en la autenticación. La amenaza compromete la seguridad de miles de servidores web, por lo que se recomienda aplicar los parches disponibles de inmediato. Infórmate sobre cómo proteger tus sistemas aquí 👉 djar.co/ScQtAV

🔗 VULNERABILIDAD EN EL ROUTER DE SOLANA

Importantes fallos de seguridad han sido detectados en el enrutador de la red Solana, facilitando el drenaje de cuentas de tokens y poniendo en riesgo la integridad de las transacciones financieras dentro de esta blockchain. Estas vulnerabilidades críticas podrían comprometer fondos y confianza en la plataforma, por lo que es imprescindible que los usuarios y desarrolladores tomen medidas urgentes para mitigar estos riesgos. Detalles y recomendaciones aquí 👉 djar.co/2clAA

📄 TRES VULNERABILIDADES EN ADOBE ACROBAT QUE COMPROMETEN SEGURIDAD

Adobe ha revelado tres vulnerabilidades críticas (CVE-2026-34621, CVE-2026-34622, CVE-2026-34626) que permiten la ejecución remota de código y la filtración de información mediante archivos PDF maliciosos. Estos fallos afectan versiones populares como Acrobat DC y Reader DC, poniendo en riesgo a millones de usuarios que manejan documentos digitales. Actualizar a la última versión es fundamental para evitar intrusiones y pérdidas de datos. Conoce los detalles y actualizaciones disponibles aquí 👉 djar.co/Rvvu5

🏛️ LA ESTRATEGIA DEL CONGRESO CONTRA BLOQUEOS MASIVOS DE IP POR LALIGA

El Congreso ha aprobado una reforma a la Ley de Servicios Digitales para evitar bloqueos masivos de direcciones IP que afecten a páginas ajenas en procesos contra la piratería, buscando un equilibrio entre la protección de derechos y la seguridad en internet. Esta medida evita que resoluciones judiciales derriben sitios web de terceros y promueve un entorno digital más seguro y regulado. Entiende el alcance y las implicaciones de esta reforma aquí 👉 djar.co/8dbV

☁️ VULNERABILIDADES CRÍTICAS EN LA IMPLEMENTACIÓN DE CLOUDFLARE

Se han reportado vulnerabilidades en los proxies de autorización y archivos PAC alojados por Cloudflare que afectan la gestión de políticas de seguridad de identidad sin necesidad de clientes en dispositivos finales. Estas fallas, aunque técnicas, representan un avance en cómo se protegen las redes y requieren atención para evitar posibles explotaciones. Mantente informado sobre cómo estas vulnerabilidades impactan la seguridad del entorno web aquí 👉 djar.co/Y6uR

🐛 DETECTANDO LA AMENAZA DEL MALWARE FAST16

Un malware avanzado, posiblemente desarrollado o patrocinado por un estado, ha sido identificado causando sabotajes discretos mediante la manipulación de programas matemáticos y simulaciones físicas. Esta amenaza tiene potencial para generar fallos graves, afectando sectores científicos y tecnológicos sensibles. La detección y respuesta temprana son claves para mitigar el daño. Aprende cómo proteger tus sistemas frente a Fast16 aquí 👉 djar.co/CN8X

  • 2
  • 1
  • 0
  • 17h ago

Bluesky

Profile picture fallback
The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts since late February.
  • 6
  • 6
  • 0
  • 16h ago
Profile picture fallback
Critical cPanel Flaw Lets Attackers Bypass Login, Patch Urgently A critical security vulnerability tracked as CVE-2026-41940 has been discovered in most versions of cPanel and WebHost Manager (WHM), potentially allowing attackers to access hosting control panels without authentication.
  • 1
  • 0
  • 0
  • 20h ago
Profile picture fallback
Our software is a mix and match of 3rd parties, tools, and services that continue to expand the attack surface. If you need an example, CVE-2026-41940 was recently identified as a critical authentication bypass in cPanel & WHM (and WP Squared), with a CVSS score of 9.8.
  • 1
  • 0
  • 0
  • 17h ago
Profile picture fallback
‼️CVE-2026-41940: cPanel & WHM Authentication Bypass (CVSS 9.8 Critical)  A critical authentication bypass has been discovered in cPanel & WHM. Modat Magnify Query:  (technology="cPanel" or web.html~"/cPanel_magic_revision_" or web.headers~"whostmgrrelogin") and tag!=honeypot
  • 1
  • 0
  • 0
  • 15h ago
Profile picture fallback
cPanel zero-day exploited for months before patch release (CVE-2026-41940) 📖 Read more: www.helpnetsecurity.com/2026/04/30/c... #cybersecurity #cybersecuritynews #0day #cPanel #securityupdate #webhosting @labs.watchtowr.com.web.brid.gy @rapid7.com
  • 1
  • 0
  • 0
  • 14h ago
Profile picture fallback
A critical vulnerability (CVE-2026-41940) in cPanel & WHM's authentication mechanism poses a severe risk to internet infrastructure, allowing unauthorized access. Discovered by watchTowr Labs, this exploit could lead to widespread disruption if not addressed promptly.
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
High Fidelity Check for the cPanel Authentication Bypass (CVE-2026-41940)
  • 0
  • 0
  • 1
  • 13h ago
Profile picture fallback
🚨 CVE-2026-41940 (9.8) Pre-auth bypass allows remote admin access (cPanel/WHM). Patch now. ▶️ Full advisory: https://bit.ly/48xsquo
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Security: CVE-2026-41940 - cPanel & WHM / WP2 Security Update 04/28/2026
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
~Cisa~ CISA added a cPanel & WHM missing authentication flaw to the KEV catalog due to active exploitation. - IOCs: CVE-2026-41940 - #CVE202641940 #ThreatIntel #cPanel
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
The Internet Is Falling Down- CPanel/WHM Authentication Bypass CVE-2026-41940 | Discussion
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
CVE-2026-41940 WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

LiteLLM-Sicherheitslücke CVE-2026-42208: SQL-Injection binnen 36 Stunden nach Veröffentlichung aktiv ausgenutzt

all-about-security.de/litellm-

#llm #cve #cybersecurity

  • 1
  • 1
  • 0
  • 22h ago

Bluesky

Profile picture fallback
LiteLLM-Sicherheitslücke CVE-2026-42208: SQL-Injection binnen 36 Stunden nach Veröffentlichung aktiv ausgenutzt www.all-about-security.de/litellm-sich... #cve #llm #cybersecurity #itsecurity #itsicherheit
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure reconbee.com/litellm-cve-... #LiteLLM #LLM #sqlinjection #SQL #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure https://securityaffairs.com/191483/hacking/cve-2026-42208-litellm-bug-exploited-36-hours-after-its-disclosure.html
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • GitHub
  • Enterprise Server

10 Mar 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.35%

KEV

Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 13 hours ago

Fediverse

Profile picture fallback

@ben @jpmens Yes,; executing commands with parameters given by the user, without any escaping. wiz.io/blog/github-rce-vulnera

  • 1
  • 0
  • 0
  • 16h ago
Profile picture fallback

📰 Critical GitHub RCE Flaw (CVE-2026-3854) Allowed Full Server Compromise via Single 'git push'

💥 Critical RCE flaw in GitHub (CVE-2026-3854) allowed repo access via a single `git push` command! Affects GitHub.com & Enterprise Server. Patches are out, but 88% of internet-facing GHES are still vulnerable. #GitHub #RCE #DevSecOps

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 13h ago

Bluesky

Profile picture fallback
GitHub yesterday disclosed CVE-2026-3854, a high severity (8.7 CVSS) vulnerability identified in GitHub Enterprise Server that would grant an attacker with push access to a repository to achieve remote code execution.
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
30 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
7.19%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 thehackernews.com/2026/04/micr

  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
[RSS] A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202

https://www.akamai.com/blog/security-research/2026/apr/incomplete-patch-apt28s-zero-day-cve-2026-32202
  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
[RSS] A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202 www.akamai.com -> Original->
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • InternLM
  • lmdeploy

20 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 5 hours ago

Fediverse

Profile picture fallback

First exploit of a fresh LMDeploy SSRF arrived 12 hours and 31 minutes after disclosure. AI inference nodes run on GPU instances with broad IAM, so one IMDS fetch can take the whole cloud account. Patch Tuesday cannot keep up with sub-13-hour weaponization.

webflow.sysdig.com/blog/cve-20

  • 1
  • 0
  • 0
  • 5h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 23 hours ago

Fediverse

Profile picture fallback

RE: mastodon.bsd.cafe/@grahamperri

3/

CVE-2026-7270 <cve.org/CVERecord?id=CVE-2026-> FreeBSD-SA-26:13.exec <security.freebsd.org/advisorie> credited to Ryan of Calif.io.

Calif is recently known for post-CVE attention to an earlier CVE, <blog.calif.io/p/mad-bugs-claud>. This work by Calif was wrongly attributed to Nicholas Carlini (an error by Devansh in 'Artificial Intelligence Made Simple').

  • 0
  • 1
  • 0
  • 23h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

11 Mar 2025
Published
13 Feb 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
7.83%

Description

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 17 hours ago

Fediverse

Profile picture fallback

CISA just added CVE-2025-24054 to its Known Exploited Vulnerabilities catalog, mandating federal agencies patch Windows systems against an NTLM hash-leaking flaw already weaponized in the wild.

Read more: steelefortress.com/6o7x90

CyberDefense

  • 0
  • 1
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache ActiveMQ Broker
  • org.apache.activemq:activemq-broker

07 Apr 2026
Published
17 Apr 2026
Updated

CVSS
Pending
EPSS
65.07%

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture fallback

Today is the federal patch deadline for Apache ActiveMQ's Jolokia bug, CVE-2026-34197. Horizon3.ai traced the root cause back thirteen years. Shadowserver scanned 6,364 exposed instances April 19. Fortinet saw exploitation peak April 14. The Jolokia management API lets an attacker fetch a remote config and run OS commands as the broker. Long-deployed code does not earn trust by survival. I have audited this assumption out of every threat model I touch.

#InfoSec #OpenSource #DevOps

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • AWS
  • FreeRTOS-Plus-TCP

29 Apr 2026
Published
29 Apr 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.01%

KEV

Description

Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network actor to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, and to cause a denial of service (permanent IP task freeze requiring hardware reset) by sending a single crafted DHCPv6 packet. The issue is present whenever DHCPv6 is enabled. To mitigate this issue, users should upgrade to version V4.2.6 or V4.4.1 or newer.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
CVE-2026-7424 - Integer Underflow in DHCPv6 Sub-Option Parser in FreeRTOS-Plus-TCP #patchmanagement
  • 0
  • 0
  • 0
  • 16h ago
Showing 1 to 10 of 32 CVEs