<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Many of your systems will not have the algif_aead and af_alg kernel modules loaded prior exploiting the #copyfail vulnerability.]]></title><description><![CDATA[<p>Many of your systems will not have the algif_aead and af_alg kernel modules loaded prior exploiting the <a href="https://infosec.exchange/tags/copyfail" rel="tag">#<span>copyfail</span></a> vulnerability. So checking your kernel logs for "NET: Registered PF_ALG protocol family" is a good <a href="https://infosec.exchange/tags/threathunting" rel="tag">#<span>threathunting</span></a> for today. <a href="https://infosec.exchange/tags/cve_2026_31431" rel="tag">#<span>cve_2026_31431</span></a> <a href="https://infosec.exchange/tags/siem" rel="tag">#<span>siem</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/906579ce-5db8-4750-9386-161878270b2c/many-of-your-systems-will-not-have-the-algif_aead-and-af_alg-kernel-modules-loaded-prior-exploiting-the-copyfail-vulnerability.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 15:32:22 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/906579ce-5db8-4750-9386-161878270b2c.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 30 Apr 2026 12:28:28 GMT</pubDate><ttl>60</ttl></channel></rss>