[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-31431":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-02T06:24:39.445Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":19,"aliases":79,"duplicate_of":9,"upstream":80,"downstream":81,"duplicates":86,"related":87,"reserved_at":9,"published_at":88,"modified_at":89,"state":90,"summary":91,"references_raw":100,"kevs":265,"epss":276,"epss_history":278,"metrics":307,"affected":315},"CVE-2026-31431","In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_aead - Revert to operating out-of-place\n\nThis mostly reverts commit 72548b093ee3 except for the copying of\nthe associated data.\n\nThere is no benefit in operating in-place in algif_aead since the\nsource and destination come from different mappings.  Get rid of\nall the complexity added for in-place operation and just copy the\nAD directly.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-669","Incorrect Resource Transfer Between Spheres","The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides unintended control over that resource.","weakness","Draft","Class",[],[20,29,37,42,46,50,54,59],{"_key":21,"name":22,"source":23,"url":24,"maturity":25,"reliability_score":26,"verified":27,"type":9,"platforms":28,"requires_auth":9,"exploitdb":9,"metasploit":9},"GITHUB_THEORI-IO_COPY-FAIL-CVE-2026-31431","Copy Fail Cve 2026 31431","github","https://github.com/theori-io/copy-fail-CVE-2026-31431","poc",0.3,false,[],{"_key":30,"name":31,"source":32,"url":33,"maturity":34,"reliability_score":35,"verified":27,"type":9,"platforms":36,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_17000621C649CACF","Exploit Reference (openwall.com)","reference","http://www.openwall.com/lists/oss-security/2026/04/29/23","unknown",0.2,[],{"_key":38,"name":39,"source":32,"url":40,"maturity":34,"reliability_score":35,"verified":27,"type":9,"platforms":41,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_8C2219AC3DE6E349","Exploit Reference (copy.fail)","https://copy.fail",[],{"_key":43,"name":31,"source":32,"url":44,"maturity":34,"reliability_score":35,"verified":27,"type":9,"platforms":45,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_8726746C24E07534","http://www.openwall.com/lists/oss-security/2026/04/29/26",[],{"_key":47,"name":31,"source":32,"url":48,"maturity":34,"reliability_score":35,"verified":27,"type":9,"platforms":49,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_685DD72F5C6C6559","http://www.openwall.com/lists/oss-security/2026/04/30/5",[],{"_key":51,"name":31,"source":32,"url":52,"maturity":34,"reliability_score":35,"verified":27,"type":9,"platforms":53,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_83315A904BEA84AE","http://www.openwall.com/lists/oss-security/2026/04/30/18",[],{"_key":55,"name":56,"source":32,"url":57,"maturity":34,"reliability_score":35,"verified":27,"type":9,"platforms":58,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_8D59C64ADCF9BB14","Exploit Reference (websec.net)","https://websec.net/blog/cve-2026-31431-linux-algifaead-page-cache-write-to-root-69f38a4ccddd2db1f520f170",[],{"_key":60,"name":61,"source":62,"url":63,"maturity":64,"reliability_score":65,"verified":66,"type":67,"platforms":68,"requires_auth":27,"exploitdb":9,"metasploit":69},"MSF_EXPLOIT_LINUX_LOCAL_CVE_2026_31431_COPY_FAIL","Copy Fail AF_ALG + authencesn Page-Cache Write","metasploit","https://github.com/rapid7/metasploit-framework/blob/master/modules/exploit/linux/local/cve_2026_31431_copy_fail.rb","weaponized",1,true,"remote",[],{"fullname":70,"rank":71,"rank_name":72,"post_auth":27,"check":66,"notes":73},"exploit/linux/local/cve_2026_31431_copy_fail",600,"excellent",{"Stability":74,"SideEffects":76,"Reliability":77},[75],"crash-safe",[],[78],"repeatable-session",[],[],[82,84],{"_key":83},"UBUNTU-CVE-2026-31431",{"_key":85},"DEBIAN-CVE-2026-31431",[],[],"2026-04-22T08:15:10.123Z","2026-05-02T03:55:23.146Z","Modified",{"cisa_kev":66,"cisa_ransomware":27,"cisa_vendor":92,"epss_severity":93,"epss_score":94,"severity":95,"severity_score":96,"severity_version":97,"severity_source":98,"severity_vector":99,"severity_status":90},"Linux","low",0.02602,"high",7.8,"v3.1","cve.org","CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",[101,107,111,115,119,123,126,130,133,137,140,144,148,152,156,160,164,168,172,176,180,184,188,192,195,199,203,207,211,216,220,224,229,233,237,241,245,249,253,257,261],{"url":102,"sources":103,"tags":105},"https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8",[98,104],"nvd",[106],"Patch",{"url":108,"sources":109,"tags":110},"https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237",[98,104],[106],{"url":112,"sources":113,"tags":114},"https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5",[98,104],[106],{"url":24,"sources":116,"tags":117},[98,104],[118],"Exploit",{"url":33,"sources":120,"tags":121},[98,104],[118,122,106],"Mailing List",{"url":40,"sources":124,"tags":125},[98,104],[118],{"url":127,"sources":128,"tags":129},"http://www.openwall.com/lists/oss-security/2026/04/29/25",[98,104],[122,106],{"url":44,"sources":131,"tags":132},[98,104],[118,122,106],{"url":134,"sources":135,"tags":136},"http://www.openwall.com/lists/oss-security/2026/04/30/2",[98,104],[122],{"url":48,"sources":138,"tags":139},[98,104],[118,122,106],{"url":141,"sources":142,"tags":143},"http://www.openwall.com/lists/oss-security/2026/04/30/6",[98,104],[122],{"url":145,"sources":146,"tags":147},"https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667",[98,104],[106],{"url":149,"sources":150,"tags":151},"https://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c",[98,104],[106],{"url":153,"sources":154,"tags":155},"https://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b",[98,104],[106],{"url":157,"sources":158,"tags":159},"https://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc",[98,104],[106],{"url":161,"sources":162,"tags":163},"https://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82",[98,104],[106],{"url":165,"sources":166,"tags":167},"http://www.openwall.com/lists/oss-security/2026/04/30/10",[98,104],[122,106],{"url":169,"sources":170,"tags":171},"http://www.openwall.com/lists/oss-security/2026/04/30/11",[98,104],[122,106],{"url":173,"sources":174,"tags":175},"http://www.openwall.com/lists/oss-security/2026/04/30/12",[98,104],[122,106],{"url":177,"sources":178,"tags":179},"http://www.openwall.com/lists/oss-security/2026/04/30/14",[98,104],[122,106],{"url":181,"sources":182,"tags":183},"http://www.openwall.com/lists/oss-security/2026/04/30/15",[98,104],[122,106],{"url":185,"sources":186,"tags":187},"http://www.openwall.com/lists/oss-security/2026/04/30/16",[98,104],[122,106],{"url":189,"sources":190,"tags":191},"http://www.openwall.com/lists/oss-security/2026/04/30/17",[98,104],[122],{"url":52,"sources":193,"tags":194},[98,104],[118,122],{"url":57,"sources":196,"tags":197},[98,104],[118,198],"Third Party Advisory",{"url":200,"sources":201,"tags":202},"http://www.openwall.com/lists/oss-security/2026/04/30/20",[98,104],[122],{"url":204,"sources":205,"tags":206},"http://www.openwall.com/lists/oss-security/2026/05/01/2",[98,104],[122],{"url":208,"sources":209,"tags":210},"http://www.openwall.com/lists/oss-security/2026/05/01/3",[98,104],[122],{"url":212,"sources":213,"tags":214},"https://xint.io/blog/copy-fail-linux-distributions#the-fix-6",[98,104],[215],"Mitigation",{"url":217,"sources":218,"tags":219},"https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/",[98,104],[215],{"url":221,"sources":222,"tags":223},"https://access.redhat.com/security/cve/cve-2026-31431#cve-details-mitigation",[98,104],[215],{"url":225,"sources":226,"tags":227},"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431",[98,104],[228],"Government Resource",{"url":230,"sources":231,"tags":232},"http://www.openwall.com/lists/oss-security/2026/05/01/10",[98,104],[],{"url":234,"sources":235,"tags":236},"http://www.openwall.com/lists/oss-security/2026/05/01/12",[98,104],[],{"url":238,"sources":239,"tags":240},"http://www.openwall.com/lists/oss-security/2026/05/01/15",[98,104],[],{"url":242,"sources":243,"tags":244},"http://www.openwall.com/lists/oss-security/2026/05/01/16",[98,104],[],{"url":246,"sources":247,"tags":248},"http://www.openwall.com/lists/oss-security/2026/05/01/17",[98,104],[],{"url":250,"sources":251,"tags":252},"http://www.openwall.com/lists/oss-security/2026/05/01/18",[98,104],[],{"url":254,"sources":255,"tags":256},"http://www.openwall.com/lists/oss-security/2026/05/01/22",[98,104],[],{"url":258,"sources":259,"tags":260},"http://www.openwall.com/lists/oss-security/2026/05/01/23",[98,104],[],{"url":262,"sources":263,"tags":264},"http://www.openwall.com/lists/oss-security/2026/05/01/24",[98,104],[],[266],{"source":267,"vendor":92,"product":268,"date_added":269,"vulnerability_name":270,"short_description":271,"required_action":272,"due_date":273,"known_ransomware_campaign_use":274,"notes":275,"exploitation_type":9},"cisa","Kernel","2026-05-01","Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability","Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.","\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","2026-05-15","Unknown","https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/; https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 ; https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/ ; https://nvd.nist.gov/vuln/detail/CVE-2026-31431",{"date":269,"score":94,"percentile":277},0.85679,[279,283,285,288,290,292,295,299,302,306],{"date":280,"score":281,"percentile":282},"2026-04-22",0.00007,0.00599,{"date":284,"score":281,"percentile":282},"2026-04-23",{"date":286,"score":281,"percentile":287},"2026-04-24",0.00597,{"date":289,"score":281,"percentile":287},"2026-04-25",{"date":291,"score":281,"percentile":282},"2026-04-26",{"date":293,"score":281,"percentile":294},"2026-04-27",0.00596,{"date":296,"score":297,"percentile":298},"2026-04-28",0.00008,0.00715,{"date":300,"score":297,"percentile":301},"2026-04-29",0.00718,{"date":303,"score":304,"percentile":305},"2026-04-30",0.00009,0.00915,{"date":269,"score":94,"percentile":277},[308,313],{"source":98,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":309,"cvss_v4_0":9},{"baseScore":96,"baseSeverity":310,"vectorString":99,"impactScore":311,"exploitabilityScore":312},"HIGH",9.8,4.6,{"source":104,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":314,"cvss_v4_0":9},{"baseScore":96,"baseSeverity":310,"vectorString":99,"impactScore":311,"exploitabilityScore":312},[316,349],{"ecosystem":9,"name":92,"vendor":317,"product":317,"cpe_part":318,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":319},"linux","a",[320,326,329,332,335,338,341,344,347],{"version":321,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":324,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C 893d22e0135fa394db81df88697fba6032747667","72548b093ee38a6d4f2a19e6ef1948ae05c181f7","including","893d22e0135fa394db81df88697fba6032747667","excluding",{"version":327,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":328,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C 19d43105a97be0810edbda875f2cd03f30dc130c","19d43105a97be0810edbda875f2cd03f30dc130c",{"version":330,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":331,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C 961cfa271a918ad4ae452420e7c303149002875b","961cfa271a918ad4ae452420e7c303149002875b",{"version":333,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":334,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C 3115af9644c342b356f3f07a4dd1c8905cd9a6fc","3115af9644c342b356f3f07a4dd1c8905cd9a6fc",{"version":336,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":337,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C 8b88d99341f139e23bdeb1027a2a3ae10d341d82","8b88d99341f139e23bdeb1027a2a3ae10d341d82",{"version":339,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":340,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8","fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8",{"version":342,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":343,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C ce42ee423e58dffa5ec03524054c9d8bfd4f6237","ce42ee423e58dffa5ec03524054c9d8bfd4f6237",{"version":345,"is_range":66,"range_type":98,"version_start":322,"version_start_type":323,"version_end":346,"version_end_type":325,"fixed_in":9},">= 72548b093ee38a6d4f2a19e6ef1948ae05c181f7, \u003C a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5","a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5",{"version":348,"is_range":27,"range_type":98,"version_start":348,"version_start_type":323,"version_end":348,"version_end_type":323,"fixed_in":9},"4.14",{"ecosystem":9,"name":350,"vendor":317,"product":351,"cpe_part":352,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":353},"linux kernel","linux_kernel","o",[354,358,362,366,370,374,378,382,384,386,388,390,392],{"version":355,"is_range":66,"range_type":356,"version_start":348,"version_start_type":323,"version_end":357,"version_end_type":325,"fixed_in":9},"gte4.14_lt5.10.254","cpe","5.10.254",{"version":359,"is_range":66,"range_type":356,"version_start":360,"version_start_type":323,"version_end":361,"version_end_type":325,"fixed_in":9},"gte5.11_lt5.15.204","5.11","5.15.204",{"version":363,"is_range":66,"range_type":356,"version_start":364,"version_start_type":323,"version_end":365,"version_end_type":325,"fixed_in":9},"gte5.16_lt6.1.170","5.16","6.1.170",{"version":367,"is_range":66,"range_type":356,"version_start":368,"version_start_type":323,"version_end":369,"version_end_type":325,"fixed_in":9},"gte6.2_lt6.6.137","6.2","6.6.137",{"version":371,"is_range":66,"range_type":356,"version_start":372,"version_start_type":323,"version_end":373,"version_end_type":325,"fixed_in":9},"gte6.7_lt6.12.85","6.7","6.12.85",{"version":375,"is_range":66,"range_type":356,"version_start":376,"version_start_type":323,"version_end":377,"version_end_type":325,"fixed_in":9},"gte6.13_lt6.18.22","6.13","6.18.22",{"version":379,"is_range":66,"range_type":356,"version_start":380,"version_start_type":323,"version_end":381,"version_end_type":325,"fixed_in":9},"gte6.19_lt6.19.12","6.19","6.19.12",{"version":383,"is_range":27,"range_type":356,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"7.0:rc1",{"version":385,"is_range":27,"range_type":356,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"7.0:rc2",{"version":387,"is_range":27,"range_type":356,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"7.0:rc3",{"version":389,"is_range":27,"range_type":356,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"7.0:rc4",{"version":391,"is_range":27,"range_type":356,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"7.0:rc5",{"version":393,"is_range":27,"range_type":356,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"7.0:rc6"]