Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAKL5tx93jAFQKAWaYySyKdzZqaX=hxRn-aukedT8GKW=ZKgs4w@mail.gmail.com>
Date: Mon, 18 May 2026 16:26:52 +0400
From: Andrei Berestov <berestov0181@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-31431 Copy Fail Linux LPE - new public exploit

Hello,

Following up on the previous discussion about CVE-2026-31431 (Copy Fail).

A new public repository with fully functional exploit code was published
today (2026-05-18) on GitHub:

https://github.com/4xura/CVE-2026-31431-CopyFail

The repository contains:
- exploit.c, exploit.py, exploit.pl, exploit.asm (x86_64 NASM)
- proof-of-concept: copyfail_poc.c, copyfail_poc.py
- bpftrace diagnostic scripts for AF_ALG + splice path

Attack vector: AF_ALG socket (Linux Crypto API) + splice() syscall,
targeting filemap_splice and authencesn decrypt path.

As noted by Willy Tarreau, all stable kernels were patched on April 30.
Systems running unpatched kernels remain at risk.

Regards,
Andrei Berestov

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.