<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T21:00:21.064808+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0fe4ee51-5305-4026-bf5e-a3ed46a3f361/export</id>
    <title>0fe4ee51-5305-4026-bf5e-a3ed46a3f361</title>
    <updated>2026-05-04T21:00:21.070637+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0fe4ee51-5305-4026-bf5e-a3ed46a3f361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2au4kdt52u", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "creation_timestamp": "2026-05-04T18:00:20.516442Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0fe4ee51-5305-4026-bf5e-a3ed46a3f361/export"/>
    <published>2026-05-04T18:00:20.516442+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8d716eb6-f302-4140-877b-5f681e995106/export</id>
    <title>8d716eb6-f302-4140-877b-5f681e995106</title>
    <updated>2026-05-04T21:00:21.070528+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8d716eb6-f302-4140-877b-5f681e995106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-31431", "type": "seen", "source": "https://bsky.app/profile/mm-ilsoftware-bot.bsky.social/post/3ml2auoi22u2p", "content": "CVE-2026-31431: perch\u00e9 Linux Copy Fail preoccupa\nUna vulnerabilit\u00e0 nel kernel Linux, presente dal 2017, consente escalation a root manipolando la page cache. CISA e altri sogge...\nhttps://www.ilsoftware.it/vulnerabilita-linux-copy-fail-cve-2026-31431/", "creation_timestamp": "2026-05-04T18:00:39.649211Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8d716eb6-f302-4140-877b-5f681e995106/export"/>
    <published>2026-05-04T18:00:39.649211+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2e295ddc-ffb5-40cf-9391-cc3ba430afd6/export</id>
    <title>2e295ddc-ffb5-40cf-9391-cc3ba430afd6</title>
    <updated>2026-05-04T21:00:21.070428+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2e295ddc-ffb5-40cf-9391-cc3ba430afd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2d2d3idz2x", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "creation_timestamp": "2026-05-04T18:39:35.987754Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2e295ddc-ffb5-40cf-9391-cc3ba430afd6/export"/>
    <published>2026-05-04T18:39:35.987754+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/65ac8204-7f5a-4ce8-9f5d-4967a1029e87/export</id>
    <title>65ac8204-7f5a-4ce8-9f5d-4967a1029e87</title>
    <updated>2026-05-04T21:00:21.070330+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "65ac8204-7f5a-4ce8-9f5d-4967a1029e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2d44phkd2e", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "creation_timestamp": "2026-05-04T18:40:36.395086Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/65ac8204-7f5a-4ce8-9f5d-4967a1029e87/export"/>
    <published>2026-05-04T18:40:36.395086+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/53afef64-42d4-4998-afe9-7930b3bcdd9b/export</id>
    <title>53afef64-42d4-4998-afe9-7930b3bcdd9b</title>
    <updated>2026-05-04T21:00:21.070231+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "53afef64-42d4-4998-afe9-7930b3bcdd9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2e4w4vwn22", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "creation_timestamp": "2026-05-04T18:58:56.973169Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/53afef64-42d4-4998-afe9-7930b3bcdd9b/export"/>
    <published>2026-05-04T18:58:56.973169+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b28347b4-7e44-42c9-9e8a-4bbc5d35c431/export</id>
    <title>b28347b4-7e44-42c9-9e8a-4bbc5d35c431</title>
    <updated>2026-05-04T21:00:21.070127+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b28347b4-7e44-42c9-9e8a-4bbc5d35c431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/sebclick.bsky.social/post/3ml2e7lqlqc2z", "content": "Copy Fail (CVE-2026-31431) : Synth\u00e8se technique sur cette faille Linux www.linuxtricks.fr/news/10-logi...", "creation_timestamp": "2026-05-04T19:00:30.193234Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b28347b4-7e44-42c9-9e8a-4bbc5d35c431/export"/>
    <published>2026-05-04T19:00:30.193234+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38b840b2-9cb5-42c7-872a-94f42c5ae298/export</id>
    <title>38b840b2-9cb5-42c7-872a-94f42c5ae298</title>
    <updated>2026-05-04T21:00:21.070018+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38b840b2-9cb5-42c7-872a-94f42c5ae298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3ml2gfw3csci2", "content": "CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments A high-severity Linux vulnerability, \u201cCopy Fail\u201d (CVE-2026-31431), enables root privile...\n\n#Linux\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-04T19:39:49.302500Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38b840b2-9cb5-42c7-872a-94f42c5ae298/export"/>
    <published>2026-05-04T19:39:49.302500+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ef150ce2-e667-4c8e-b705-9196bd158c8d/export</id>
    <title>ef150ce2-e667-4c8e-b705-9196bd158c8d</title>
    <updated>2026-05-04T21:00:21.069893+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ef150ce2-e667-4c8e-b705-9196bd158c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://gist.github.com/Sagreras/8b433fc36ef0b27726c0ff435a8a5638", "content": "", "creation_timestamp": "2026-05-04T20:11:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ef150ce2-e667-4c8e-b705-9196bd158c8d/export"/>
    <published>2026-05-04T20:11:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/44a1b56e-b23f-4660-a722-6b42d6f48f59/export</id>
    <title>44a1b56e-b23f-4660-a722-6b42d6f48f59</title>
    <updated>2026-05-04T21:00:21.069744+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "44a1b56e-b23f-4660-a722-6b42d6f48f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/dietpi.com/post/3ml2j33d3wc2r", "content": "We gathered all info about how to mitigate the recently disclosed CVE-2026-31431 aka \"Copy Fail\" on #DietPi systems.\n\nPlease read through this, to assure your system is not vulnerable: github.com/MichaIng/Die...\n\nThe same applies to every other Linux system!\n\n#CopyFail #Security #Linux", "creation_timestamp": "2026-05-04T20:27:24.885816Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/44a1b56e-b23f-4660-a722-6b42d6f48f59/export"/>
    <published>2026-05-04T20:27:24.885816+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/458a157b-9282-4ea8-b038-8a1606b108f7/export</id>
    <title>458a157b-9282-4ea8-b038-8a1606b108f7</title>
    <updated>2026-05-04T21:00:21.068397+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "458a157b-9282-4ea8-b038-8a1606b108f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-31431", "type": "seen", "source": "https://bsky.app/profile/dietpi.com/post/3ml2j6tyr6222", "content": "We gathered all info about how to mitigate the recently disclosed CVE-2026-31431 aka \"Copy Fail\" on #DietPi systems.\n\nPlease read through this, to assure your system is not vulnerable: github.com/MichaIng/Die...\n\nThe same applies to every other Linux system!\n\n#CopyFail #Security #Linux", "creation_timestamp": "2026-05-04T20:29:30.832424Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/458a157b-9282-4ea8-b038-8a1606b108f7/export"/>
    <published>2026-05-04T20:29:30.832424+00:00</published>
  </entry>
</feed>
