|
|
Message-ID: <CAKL5tx93jAFQKAWaYySyKdzZqaX=hxRn-aukedT8GKW=ZKgs4w@mail.gmail.com> Date: Mon, 18 May 2026 16:26:52 +0400 From: Andrei Berestov <berestov0181@...il.com> To: oss-security@...ts.openwall.com Subject: CVE-2026-31431 Copy Fail Linux LPE - new public exploit Hello, Following up on the previous discussion about CVE-2026-31431 (Copy Fail). A new public repository with fully functional exploit code was published today (2026-05-18) on GitHub: https://github.com/4xura/CVE-2026-31431-CopyFail The repository contains: - exploit.c, exploit.py, exploit.pl, exploit.asm (x86_64 NASM) - proof-of-concept: copyfail_poc.c, copyfail_poc.py - bpftrace diagnostic scripts for AF_ALG + splice path Attack vector: AF_ALG socket (Linux Crypto API) + splice() syscall, targeting filemap_splice and authencesn decrypt path. As noted by Willy Tarreau, all stable kernels were patched on April 30. Systems running unpatched kernels remain at risk. Regards, Andrei Berestov
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.