📰 2026-04-30 03:00 更新
🔸 Copy Fail – CVE-2026-31431 / 复制失败– CVE-2026-31431
🔗 Copy Fail – CVE-2026-31431
🔥 93 points
原文:
Who is affected If your kernel was built between 2017 and the patch — which covers essentially every mainstream Linux distribution — you’re in scope. Copy Fail requires only an unprivileged local user account — no network access, no kernel debugging features, no pre-installed primitives. The kernel crypto API (AF_ALG) ships enabled in essentially every mainstream distro’s default config, so the entire 2017 → patch window is in play out of the box. Distributions we directly verified: Distribut…
译文:
谁会受到影响如果您的内核是在2017年和补丁(基本上涵盖了每个主流Linux发行版)之间构建的,那么您就在范围内。复制失败只需要一个无特权的本地用户帐户—没有网络访问,没有内核调试功能,没有预先安装的基元。基本上每个主流发行版的默认配置中都启用了内核加密API ( AF_ALG ) ,因此整个2017年→补丁窗口开箱即用 .我们直接验证的分布:分布…
自动更新 · 正文抓取 · 双语翻译