R
News
Linux Kernel “Copy Fail” Local Privilege Escalation Vulnerability

Overview
CVE: CVE-2026-31431
Severity: High
CVSS: 7.8
Published: 30 April 2026
Affected Product: Linux kernel
A critical vulnerability dubbed “Copy Fail” has been disclosed in the Linux kernel cryptographic subsystem. The flaw allows local privilege escalation to root by exploiting a logic issue in the kernel’s crypto API. Given the simplicity of exploitation and broad impact across distributions, environments running shared systems or containers may face elevated risk.
Affected Versions
Linux kernel versions across major distributions released since 2017
Vulnerability Breakdown
CVE-2026-31431 - Page cache write leading to local privilege escalation
Severity: High
CVSS: 7.8
Description: Copy Fail is a logic flaw in the Linux kernel crypto API. By chaining AF_ALG with splice() and authencesn decryption, an attacker can trigger a controlled four-byte write into the page cache of any readable file.
Impact: An unprivileged local user may be able to tamper with a setuid binary in memory and escalate to root. In shared-kernel environments, the same primitive may also support container escape and node compromise.
Conditions: Requires local code execution or an unprivileged local account. AF_ALG must be available, and the issue is not remotely exploitable on its own.
Notes: Risk is highest on multi-tenant Linux hosts, CI runners, shell boxes and Kubernetes nodes. Single-user workstations are still exposed, but the business impact is usually lower unless another foothold already exists.
Mitigation
Apply the latest vendor-supplied kernel update as a priority.
Validate that your kernel includes the fix reverting algif_aead to out-of-place operation.
Until patching is complete, disable the algif_aead module if operationally safe.
For untrusted workloads, block AF_ALG socket creation via seccomp where possible.
Prioritise shared Linux infrastructure, container hosts, CI runners and other systems that execute untrusted or tenant-supplied code.
Review for recent local footholds, suspicious privilege escalation activity and unauthorised access paths.
Summary for IT Teams
Products: Linux kernel
Threat Level: High, CVSS 7.8
Action Required: Patch affected kernels urgently, apply temporary AF_ALG mitigations where required, and prioritise shared Linux environments where a limited foothold could become full host compromise.
Reference
Copy Fail: 732 Bytes to Root on Every Major Linux Distribution
The Register: Linux cryptographic code flaw offers fast route to root
Openwall oss-security advisory for CVE-2026-31431
Need Help?
If you need assistance assessing exposure, validating patched versions, or coordinating urgent remediation across internet-facing systems, contact Secure ISS on 1300 769 460.
