To mitigate #copyFail on #wsl (because #microsoft hasn't released patched kernel yet!) you need to add the following entry in your .wslconfig file

kernelCommandLine=module_blacklist=algif_aead

https://learn.microsoft.com/en-us/windows/wsl/wsl-config

#linux #windows

Advanced settings configuration in WSL

A guide to the wsl.conf and .wslconfig files used for configuring settings when running multiple Linux distributions on Windows Subsystem for Linux.

Why was I ( an engineer that does not work in #InfoSec ) the person who had to bring the #copyfail CVE to the attention of senior management today?

#jfc #Stupid

[OpenWrt Wiki] OpenWrt 25.12.3 - Service Release - 6. May 2026

The disclosure timeline of #copyfail looks completely strange. The kernel was patched on April 1st, CVE was created on 22nd and public disclose was on 29th. But most distros seemed to be completely unaware until disclosure day. What happened in April? Was no Linux distro notified?

#Linode (#Akamai Cloud) has published documentation on how to mitigate #CopyFail for both new and existing instances running there:

https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

CVE-2026-31431: Copy Fail Mitigation

CVE-2026-31431 ("Copy Fail") is a Linux vulnerability publicly disclosed on April 29, 2026. This article shows how to identify vulnerable systems and apply mitigation.

Linode Guides & Tutorials

Eric Biggers has submitted a Linux patch to start the deprecation of the AF_ALG API at the heart of #CopyFail as well as several other CVEs:

https://lore.kernel.org/linux-crypto/2[email protected]/

#copyfail #cve_2026_31431 #linux #security

[PATCH] crypto: af_alg - Document the deprecation of AF_ALG - Eric Biggers

Attackers Exploit Fresh 'CopyFail' Linux Flaw for Financial Gain

Attackers are already exploiting a newly discovered Linux flaw called CopyFail to line their pockets, and it's essential to stay informed about this developing threat. The vulnerability has been identified, and malicious actors are capitalizing on it - but details on affected systems and patches are still emerging.

https://osintsights.com/attackers-exploit-fresh-copyfail-linux-flaw-for-financial-gain?utm_source=mastodon&utm_medium=social

#LinuxFlaw #Copyfail #EmergingThreats #FinancialMalware #LinuxVulnerability

Attackers Exploit Fresh 'CopyFail' Linux Flaw for Financial Gain

Learn how attackers exploit the CopyFail Linux flaw for financial gain and take immediate action to protect your systems - read the full report now and stay secure.

OSINTSights
Linux-Lücke „Copy Fail“ wird bereits angegriffen | heise online
https://heise.de/-11279850 #LinuxKernel #Linux #Sicherheitslücke #CopyFail

#OpenShift hosters 🔊 Red Hat has released blocker for copy-fail vulnerability, no reboots needed:

https://access.redhat.com/solutions/7142136

#RedHat #CopyFail #CVE202631431

CVE-2026-31431 Mitigation for Managed OpenShift (Zero-Reboot BPF LSM DaemonSet) - Red Hat Customer Portal

All OpenShift clusters are confirmed to be affected by CVE-2026-31431 ("Copy Fail"), which has been classified as an important vulnerability. Red Hat is developing a fix for the CVE that will be released in z-streams for OpenShift 4.16, 4.18, 4.19, 4.20, and 4.21. Until the fix is released, a mitigation can be applied to the cluster to disable the affected component.

Red Hat Customer Portal

The Register has a solid writeup on what we know so far about copy fail.

https://www.theregister.com/2026/05/05/cisa_sounds_the_alarm_on/

#copyfail #cve

Attackers are cashing in on fresh 'CopyFail' Linux flaw

: Researchers dropped a reliable root exploit and it didn’t sit idle for long

The Register