CVE-2026-31431
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: algif_aead - Revert to operating out-of-place
This mostly reverts commit 72548b093ee3 except for the copying of the associated data.
There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
Affected products
165- cpe:2.3:a:arista:cloudvision_agni:*:*:*:*:*:-:*:*Range: >=2024.4.0,<=2025.2.2
- cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*Range: >=2024.2.0,<=2026.1.0
- cpe:2.3:a:arista:velocloud_gateway:-:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:caas_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:enterprise_storage:7.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_proxy:4.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:suse:manager_proxy:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:4.3:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_retail_branch_server:4.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:suse:manager_retail_branch_server:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_retail_branch_server:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_retail_branch_server:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_retail_branch_server:4.3:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_server:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_server:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:velocloud_orchestrator:-:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:*
cpe:2.3:o:arista:netvisor_os:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:arista:netvisor_os:*:*:*:*:*:*:*:*range: <7.1.0
- cpe:2.3:o:arista:netvisor_os:7.1.0:-:*:*:*:*:*:*
- cpe:2.3:o:arista:netvisor_os:7.1.0:hotfix7:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.14,<5.10.254
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\/dp_mfp_firmware:*:*:*:*:*:*:*:*Range: >=3.1.5
- cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\/dp_mfp_firmware:*:*:*:*:*:*:*:*Range: >=3.1.5
- cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:*:*:*:*:*:*:*:*Range: <1.1
- cpe:2.3:o:siemens:siplus_s7-1500_cpu_1518-4_pn\/dp_mfp_firmware:*:*:*:*:*:*:*:*Range: >=3.1.5
cpe:2.3:o:suse:basesystem_module:15:sp1:*:*:*:suse_linux_enterprise:*:*+ 6 more
- cpe:2.3:o:suse:basesystem_module:15:sp1:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:basesystem_module:15:sp2:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:basesystem_module:15:sp3:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:basesystem_module:15:sp4:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:basesystem_module:15:sp5:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:basesystem_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:basesystem_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
cpe:2.3:o:suse:development_tools_module:15:sp1:*:*:*:suse_linux_enterprise:*:*+ 6 more
- cpe:2.3:o:suse:development_tools_module:15:sp1:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:development_tools_module:15:sp2:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:development_tools_module:15:sp3:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:development_tools_module:15:sp4:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:development_tools_module:15:sp5:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:development_tools_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:development_tools_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:legacy_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*+ 8 more
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp5:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp4:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp6:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp7:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:16.0:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:-:*:*:*+ 16 more
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp6:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp7:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp5:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp5:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp5:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp6:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_micro:5.0:*:*:*:*:-:*:*+ 8 more
- cpe:2.3:o:suse:linux_enterprise_micro:5.0:*:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.1:*:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:rancher:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:rancher:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:rancher:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.5:*:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp5:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:-:-:*:*+ 36 more
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss_extreme_core:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss_extended_security:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:ltss:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_workstation_extension:15:sp7:*:*:*:*:*:*
cpe:2.3:o:suse:linux_micro:6.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_micro:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_micro:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_micro:6.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:public_cloud_module:15:sp6:*:*:*:suse_linux_enterprise:*:*+ 1 more
- cpe:2.3:o:suse:public_cloud_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:public_cloud_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
cpe:2.3:o:suse:realtime_module:15:sp3:*:*:*:suse_linux_enterprise:*:*+ 4 more
- cpe:2.3:o:suse:realtime_module:15:sp3:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:realtime_module:15:sp4:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:realtime_module:15:sp5:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:realtime_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
- cpe:2.3:o:suse:realtime_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
Root cause
"Missing proper handling of associated data copying in `algif_aead` leads to incorrect resource transfer between memory mappings."
Attack vector
An attacker with local access and low privileges can trigger this vulnerability by exploiting the `algif_aead` module's handling of associated data. The bug arises from an incorrect resource transfer between different memory mappings, allowing for unintended control over resources. This can lead to high impact on confidentiality, integrity, and availability. [CWE-669]
Affected code
The vulnerability lies within the `algif_aead` module in the Linux kernel. The complexity introduced for in-place operations in this module is the source of the issue.
What the fix does
The patch reverts the in-place operation complexity in `algif_aead` and instead copies the associated data. This change eliminates the flawed resource transfer mechanism that allowed unintended control, thereby resolving the vulnerability. The complexity added for in-place operations is removed, simplifying the data handling process.
Preconditions
- authAttacker must have local access.
- authAttacker must have low privileges.
Reproduction
The public exploit references provide detailed steps and code for reproducing this vulnerability.
Generated by google/gemini-2.5-flash-lite on May 2, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
76- www.openwall.com/lists/oss-security/2026/04/29/25nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/30/10nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/30/11nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/30/12nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/30/14nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/30/15nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/30/16nvdMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/29/23nvdExploitMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/29/26nvdExploitMailing ListPatch
- www.openwall.com/lists/oss-security/2026/04/30/18nvdExploitMailing List
- www.openwall.com/lists/oss-security/2026/04/30/5nvdExploitMailing ListPatch
- copy.failnvdExploit
- websec.net/blog/cve-2026-31431-linux-algifaead-page-cache-write-to-root-69f38a4ccddd2db1f520f170nvdExploitThird Party Advisory
- xint.io/blog/copy-fail-linux-distributionsnvdExploitPatchThird Party Advisory
- access.redhat.com/security/cve/cve-2026-31431nvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-082556.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-265688.htmlnvdThird Party Advisory
- lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/nvdVendor Advisory
- www.kb.cert.org/vuls/id/260001nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2026/04/30/17nvdMailing List
- www.openwall.com/lists/oss-security/2026/04/30/2nvdMailing List
- www.openwall.com/lists/oss-security/2026/04/30/20nvdMailing List
- www.openwall.com/lists/oss-security/2026/04/30/6nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/10nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/12nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/15nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/16nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/17nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/18nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/2nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/22nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/23nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/24nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/01/3nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/14nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/15nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/16nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/17nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/18nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/19nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/20nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/21nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/23nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/24nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/25nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/4nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/5nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/6nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/7nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/02/8nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/03/10nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/03/12nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/03/13nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/03/3nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/03/4nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/03/5nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/03/6nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/1nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/10nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/11nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/12nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/13nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/14nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/2nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/24nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/27nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/28nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/29nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/31nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/8nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/04/9nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/06/5nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/07/12nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/07/2nvdMailing List
- www.openwall.com/lists/oss-security/2026/05/08/13nvdMailing List
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
15- Fragnesia (CVE-2026-46300): Frequently asked questions about new Linux Kernel XFRM ESP-in-TCP privilege escalationTenable Blog · May 14, 2026
- Linux developers weigh emergency “killswitch” for vulnerable kernel functionsHelp Net Security · May 11, 2026
- Dirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chainTenable Blog · May 8, 2026
- Another Universal Linux Local Privilege Escalation (LPE) Vulnerability: Dirty Frag, (Fri, May 8th)SANS Internet Storm Center · May 8, 2026
- Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major DistributionsThe Hacker News · May 8, 2026
- How Cloudflare responded to the “Copy Fail” Linux vulnerabilityCloudflare Blog · May 7, 2026
- Attackers are cashing in on fresh 'CopyFail' Linux flawThe Register Security · May 5, 2026
- TeamPCP Weekly Analysis: 2026-W18 (2026-04-27 through 2026-05-03), (Mon, May 4th)SANS Internet Storm Center · May 4, 2026
- CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEVThe Hacker News · May 3, 2026
- Metasploit Wrap-Up 05/01/2026Rapid7 Blog · May 1, 2026
- Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerabilityTenable Blog · Apr 30, 2026
- Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)Help Net Security · Apr 30, 2026
- New Linux 'Copy Fail' Vulnerability Enables Root Access on Major DistributionsThe Hacker News · Apr 30, 2026
- Linux cryptographic code flaw offers fast route to rootThe Register Security · Apr 30, 2026
- CISA Adds One Known Exploited Vulnerability to CatalogCISA Alerts