ScopTEL CVE-2026-31431 Product Bulletin, Linux Copy Fail Vulnerability.

ScopTEL CVE-2026-31431 Product Bulletin, Linux Copy Fail Vulnerability.


Caveat

This method only applies to Rocky 8
EL6 and EL7 are both End of Life and ScopSERV is not supporting either release.
The official procedure is to update to Rocky 8 and update the kernel to the patched release.

Executive summary

A vulnerability, known as "Copy Fail", has been identified in the Linux kernel's cryptographic interface. A user with a local account could trigger the flaw to gain root privileges, such as that of a system administrator.

This issue has been assigned CVE-2026-31431 and has a severity impact of Important. Configuration settings can be used to further mitigate the impact.

Even though the severity is less than Critical, Red Hat has expedited the release of fixes. Many fixes are available with more coming soon. For the most current information, including a complete list of impacted Red Hat products, please refer to the vulnerability's CVE page.


The copy fail advisory relating to Rocky 8 is resolved by updating the kernel to the release which includes the patches for CVE-31431

Printing the changelog for the kernel to confirm the CVE is patched, confirms that:

kernel-4.18.0-553.120.1.el8_10 is patched


[root@rocky ~]# rpm -q --changelog kernel-4.18.0-553.123.1.el8_10 | grep -i 31431
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [RHEL-172187] {CVE-2026-31431}
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [RHEL-172187] {CVE-2026-31431}


How to Update the Kernel to the Patched Release


The first step is to enable kernel updates in the ScopTEL Packages Manager.
By default kernel updates are disabled to avoid recompiling dahdi/wanpipe drivers each time there is an updated kernel.
This also helps to avoid running out of drive space on the partition by caused by multiple kernel images.
To update the kernel then the Option must be changed to 'Yes' and it is recommended to disable kernel updates after updating the kernel until the next need arises.
Edit the Packages Manager|Packages tab and change the option to Yes
Save






Then it is recommended to use ssh to update the kernel.
scopserv_yum update kernel

Watch closely for any issues and when complete, reboot the Operating System to load the patched kernel.

Confirm your kernel version is updated by printing your installed kernel version:
uname -a

If the version is correct then you can run these commands to check dahdi is properly compiled:
rpm -qa |grep dahdi
dkms status
timertest





    • Related Articles

    • ScopServ Vulnerability CVE-2014-1691 January 26, 2015

      Scope: ScopServ, ScopTEL installations could be vulnerable to CVE-2014-1691. Description: Unsanitized variables are passed to the unserialize() PHP function. A remote attacker could specially-craft one of those variables allowing to load and execute ...
    • ScopServ Vulnerability CVE-2014-1691 January 26, 2015 Addendum

      In addition to https://service.scopserv.com/support/scopservhq/ShowHomePage.do?articlestatus=published#Solutions/dv/542955000000703295/en If your installation cannot immediately and fully be upgraded as per the product bulletin. You may use this ...
    • ScopTEL is not effected by CVE-2021-44228 log4j vulnerability

      ScopServ is aware of the Apache log4j vulnerability and has completed verification that this issue does not affect ScopTEL products or services. Log4j is a java addon, no ScopTEL code is written in Java. On December 9th 2021, Apache published a ...
    • CVE-2015-0235 Ghost Vulnerability

      Details: https://rhn.redhat.com/errata/RHSA-2015-0090.html Updated glibc packages that fix one security issue are now available for ScopServ Distributions built on CentOS 5. Red Hat Product Security has rated this update as having Critical security ...
    • Product Bulletin: RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034)

      https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034) Executive summary Red Hat is aware of a vulnerability found in pkexec that allows an authenticated user to perform a ...