{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2026-005.pdf"
    },
    "title": "High Vulnerability in the Linux Kernel (\"Copy Fail\")",
    "serial_number": "2026-005",
    "publish_date": "30-04-2026 09:25:30",
    "description": "On 29 April 2026, a high local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-31431 and named \"Copy Fail\", was publicly disclosed.<br>\nThe vulnerability affects every mainstream Linux distributions shipping a kernel built since 2017. A public proof-of-concept exploit has been released.<br>\nAs of the date of this advisory, no distribution has shipped a fixed kernel package. The mainline fix was committed on 1 April 2026, but vendor updates are still pending across all major distributions. CERT-EU strongly recommends applying the interim mitigation immediately, prioritising Kubernetes nodes, and CI/CD runners exposed to untrusted workloads.<br>\n",
    "url_title": "2026-005",
    "content_markdown": "---    \ntitle: 'High Vulnerability in\u00a0the\u00a0Linux\u00a0Kernel (\"Copy\u00a0Fail\")'\nnumber: '2026-005'\nversion: '1.0'\noriginal_date: '2026-04-29'\ndate: '2026-04-30'\n---\n\n_History:_\n\n* _29/04/2026 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn 29 April 2026, a high local privilege escalation vulnerability in the Linux kernel, tracked as **CVE-2026-31431** and named **\"Copy Fail\"**, was publicly disclosed [1].\n\nThe vulnerability affects every mainstream Linux distributions shipping a kernel built since 2017. A public proof-of-concept exploit has been released.\n\nAs of the date of this advisory, **no distribution has shipped a fixed kernel package**. The mainline fix was committed on 1 April 2026, but vendor updates are still pending across all major distributions. CERT-EU strongly recommends applying the interim mitigation immediately, prioritising Kubernetes nodes, and CI/CD runners exposed to untrusted workloads.\n\n# Technical Details\n\nThe vulnerability **CVE-2026-31431**, with a CVSS score of 7.8, is a local privilege escalation flaw in the Linux kernel's `algif_aead` module, the AEAD socket interface of the kernel's userspace crypto API (`AF_ALG`). The flaw originates from an in-place optimisation introduced in 2017 (commit `72548b093ee3`), which allows page-cache pages to be placed into a writable destination scatterlist. By chaining an `AF_ALG` socket operation with `splice()`, an unprivileged local user can perform a controlled 4-byte write to an arbitrary page-cache-backed page, targeting a setuid binary such as `/usr/bin/su` to obtain a root shell [1].\n\nThe upstream fix is mainline commit `a664bf3d603d`, which reverts the 2017 optimisation. It was committed on 1 April 2026 [1].\n\n# Affected Products\n\nThe vulnerability affects every mainstream Linux distribution shipping a kernel built between 2017 and the availability of the patch. The following distributions were directly verified by the researchers [1]:\n\n| Distribution      | Kernel Version              |\n|-------------------|-----------------------------|\n| Ubuntu 24.04 LTS  | 6.17.0-1007-aws             |\n| Amazon Linux 2023 | 6.18.8-9.213.amzn2023       |\n| RHEL 10.1         | 6.12.0-124.45.1.el10_1      |\n| SUSE 16           | 6.12.0-160000.9-default     |\n\nOther distributions running kernels in the affected range are implicitly affected, including Debian, Arch Linux, Fedora, Rocky Linux, AlmaLinux, Oracle Linux, and embedded Linux distributions.\n\n**Patch availability by distribution (as of 30 April 2026):**\n\n| Distribution        | Status                | \n|---------------------|-----------------------|\n| Ubuntu 20.04\u201324.04  | No fix available      | \n| Amazon Linux 2023   | No fix available      | \n| SUSE Linux Enterprise| No fix available     | \n| Red Hat Enterprise Linux | Status unknown   | \n\nNote: Ubuntu 26.04 (Resolute) and later kernels are **not affected** [2].\n\nAdditional information is available in the researcher's advisory [1] and in vendor security trackers [2,3,4].\n\n# Recommendations\n\nCERT-EU strongly recommends applying the relevant kernel update as soon as possible once vendor patches become available, prioritising Kubernetes nodes and CI/CD runners.\n\n## Temporary Mitigation\n\nDisable the `algif_aead` kernel module persistently on all affected systems until a patched kernel is available:\n```\n    echo \"install algif_aead /bin/false\" > /etc/modprobe.d/disable-algif.conf\n    rmmod algif_aead 2>/dev/null || true\n```\n\nThis workaround does not affect `dm-crypt`/LUKS, `kTLS`, IPsec/XFRM, OpenSSL, GnuTLS, NSS, or SSH. It may affect applications explicitly configured to use the `afalg` engine or that bind `aead`/`skcipher`/`hash` sockets directly. Exposure can be assessed with `lsof | grep AF_ALG`.\n\n## Hardening Containerised Environments and Pipelines\n\nCERT-EU recommends blocking `AF_ALG` socket creation via seccomp policies on all containerised workloads and pipelines, regardless of patch status [1]. This applies to Docker and Podman-based environments [5] as well as Kubernetes clusters [6]. Since the exploit requires opening an `AF_ALG` socket as a first step, this measure\neffectively prevents exploitation even on unpatched kernels.\n\n# References\n\n[1] <https://copy.fail> \n\n[2] <https://ubuntu.com/security/CVE-2026-31431>\n\n[3] <https://www.suse.com/security/cve/CVE-2026-31431>\n\n[4] <https://access.redhat.com/security/cve/CVE-2026-31431>\n\n[5] <https://docs.docker.com/engine/security/seccomp/>\n\n[6] <https://kubernetes.io/docs/tutorials/security/seccomp/>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>29/04/2026 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On 29 April 2026, a high local privilege escalation vulnerability in the Linux kernel, tracked as <strong>CVE-2026-31431</strong> and named <strong>\"Copy Fail\"</strong>, was publicly disclosed [1].</p><p>The vulnerability affects every mainstream Linux distributions shipping a kernel built since 2017. A public proof-of-concept exploit has been released.</p><p>As of the date of this advisory, <strong>no distribution has shipped a fixed kernel package</strong>. The mainline fix was committed on 1 April 2026, but vendor updates are still pending across all major distributions. CERT-EU strongly recommends applying the interim mitigation immediately, prioritising Kubernetes nodes, and CI/CD runners exposed to untrusted workloads.</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerability <strong>CVE-2026-31431</strong>, with a CVSS score of 7.8, is a local privilege escalation flaw in the Linux kernel's <code>algif_aead</code> module, the AEAD socket interface of the kernel's userspace crypto API (<code>AF_ALG</code>). The flaw originates from an in-place optimisation introduced in 2017 (commit <code>72548b093ee3</code>), which allows page-cache pages to be placed into a writable destination scatterlist. By chaining an <code>AF_ALG</code> socket operation with <code>splice()</code>, an unprivileged local user can perform a controlled 4-byte write to an arbitrary page-cache-backed page, targeting a setuid binary such as <code>/usr/bin/su</code> to obtain a root shell [1].</p><p>The upstream fix is mainline commit <code>a664bf3d603d</code>, which reverts the 2017 optimisation. It was committed on 1 April 2026 [1].</p><h2 id=\"affected-products\">Affected Products</h2><p>The vulnerability affects every mainstream Linux distribution shipping a kernel built between 2017 and the availability of the patch. The following distributions were directly verified by the researchers [1]:</p><table><thead><tr><th>Distribution</th><th>Kernel Version</th></tr></thead><tbody><tr><td>Ubuntu 24.04 LTS</td><td>6.17.0-1007-aws</td></tr><tr><td>Amazon Linux 2023</td><td>6.18.8-9.213.amzn2023</td></tr><tr><td>RHEL 10.1</td><td>6.12.0-124.45.1.el10_1</td></tr><tr><td>SUSE 16</td><td>6.12.0-160000.9-default</td></tr></tbody></table><p>Other distributions running kernels in the affected range are implicitly affected, including Debian, Arch Linux, Fedora, Rocky Linux, AlmaLinux, Oracle Linux, and embedded Linux distributions.</p><p><strong>Patch availability by distribution (as of 30 April 2026):</strong></p><table><thead><tr><th>Distribution</th><th>Status</th></tr></thead><tbody><tr><td>Ubuntu 20.04\u201324.04</td><td>No fix available</td></tr><tr><td>Amazon Linux 2023</td><td>No fix available</td></tr><tr><td>SUSE Linux Enterprise</td><td>No fix available</td></tr><tr><td>Red Hat Enterprise Linux</td><td>Status unknown</td></tr></tbody></table><p>Note: Ubuntu 26.04 (Resolute) and later kernels are <strong>not affected</strong> [2].</p><p>Additional information is available in the researcher's advisory [1] and in vendor security trackers [2,3,4].</p><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU strongly recommends applying the relevant kernel update as soon as possible once vendor patches become available, prioritising Kubernetes nodes and CI/CD runners.</p><h3 id=\"temporary-mitigation\">Temporary Mitigation</h3><p>Disable the <code>algif_aead</code> kernel module persistently on all affected systems until a patched kernel is available:</p><pre><code>echo \"install algif_aead /bin/false\" &gt; /etc/modprobe.d/disable-algif.conf\n    rmmod algif_aead 2&gt;/dev/null || true\n</code></pre><p>This workaround does not affect <code>dm-crypt</code>/LUKS, <code>kTLS</code>, IPsec/XFRM, OpenSSL, GnuTLS, NSS, or SSH. It may affect applications explicitly configured to use the <code>afalg</code> engine or that bind <code>aead</code>/<code>skcipher</code>/<code>hash</code> sockets directly. Exposure can be assessed with <code>lsof | grep AF_ALG</code>.</p><h3 id=\"hardening-containerised-environments-and-pipelines\">Hardening Containerised Environments and Pipelines</h3><p>CERT-EU recommends blocking <code>AF_ALG</code> socket creation via seccomp policies on all containerised workloads and pipelines, regardless of patch status [1]. This applies to Docker and Podman-based environments [5] as well as Kubernetes clusters [6]. Since the exploit requires opening an <code>AF_ALG</code> socket as a first step, this measure effectively prevents exploitation even on unpatched kernels.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://copy.fail\">https://copy.fail</a> </p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://ubuntu.com/security/CVE-2026-31431\">https://ubuntu.com/security/CVE-2026-31431</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.suse.com/security/cve/CVE-2026-31431\">https://www.suse.com/security/cve/CVE-2026-31431</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://access.redhat.com/security/cve/CVE-2026-31431\">https://access.redhat.com/security/cve/CVE-2026-31431</a></p><p>[5] <a rel=\"noopener\" target=\"_blank\" href=\"https://docs.docker.com/engine/security/seccomp/\">https://docs.docker.com/engine/security/seccomp/</a></p><p>[6] <a rel=\"noopener\" target=\"_blank\" href=\"https://kubernetes.io/docs/tutorials/security/seccomp/\">https://kubernetes.io/docs/tutorials/security/seccomp/</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}