Join us at AlmaLinux Day: Los Angeles on July 18!
All blog posts

Copy Fail (CVE-2026-31431) ready for testing

profile
Jonathan Wright

Infrastructure SIG Lead & ALESCo Member

The Announcement

Earlier today, the team at Xint Code disclosed a Linux kernel flaw they have named Copy Fail, tracked as CVE-2026-31431. The bug lives in the kernel’s crypto subsystem — a logic flaw in authencesn chained through AF_ALG and splice() — and it lets any unprivileged local user escalate to root with a 732-byte exploit that the researchers report works unmodified across every mainstream distribution built since 2017. Every supported AlmaLinux release is affected.

If you run AlmaLinux on a multi-tenant host, container build farm, CI runner, or any system where untrusted users can get a shell, this one matters.

More information about the vulnerability:

Patching ahead of our upstream

Security is a top priority at AlmaLinux, and the severity of this flaw — combined with how trivial it is to exploit — meant we did not want to wait. Patches are not yet available from Red Hat, so our core team has built patched kernels using the upstream fix (mainline commit a664bf3d603d, which reverts the 2017 optimization that introduced the bug). The decision to ship these ahead of a CentOS Stream / RHEL update was made by our technical steering committee, ALESCo.

These kernels are available in the testing repository today. After the community has helped verify them, we will release them to the production repositories. This blog post will be updated when that happens. It’s worth mentioning, we generally try to avoid releases on Friday but given the timing of this disclosure and the severity, this update may potentially hit production repositories on Friday or even over the weekend once we’re confident in the testing.

Help us test

It only takes a few steps to install and test the patched kernel from the testing repo.

Install the testing repo

dnf install -y almalinux-release-testing

Update the kernel

dnf update kernel

Reboot to load the new kernel

sudo reboot

Confirm you are running the patched kernel

The patched kernel versions are listed below. Use either of these commands:

uname -r
rpm -q kernel

We don’t recommend keeping the testing repo enabled after you’ve updated, unless you’ve done this on a truly non-production environment. If this is a production environment, you can disable the repo with this command:

dnf config-manager --disable almalinux-testing

If you encounter problems, please let us know as soon as you can, either in AlmaLinux chat, on bugs.almalinux.org.

A note for AlmaLinux Kitten 10 users

AlmaLinux Kitten 10 is itself a development release and does not have a separate testing repository. The patched kernel is shipping directly to Kitten’s regular repository, so there is nothing extra to enable — just update and reboot:

dnf update kernel
sudo reboot

Confirm with uname -r against the Kitten version listed below.

Patched kernel versions

  • AlmaLinux 8 is patched in kernel-4.18.0-553.121.1.el8_10 and above
  • AlmaLinux 9 is patched in kernel-5.14.0-611.49.2.el9_7 and above
  • AlmaLinux 10 is patched in kernel-6.12.0-124.52.2.el10_1 and above
  • AlmaLinux Kitten 10 is patched in kernel-6.12.0-224.el10 and above

Thanks

Thanks to Brian Pak and the team at Xint Code for finding, responsibly disclosing, and writing up this vulnerability. His technical write-up is well worth reading if you want to understand how a single logic bug in authencesn becomes a fully reliable local privilege escalation.

Thanks to Andrew Lukoshko of the AlmaLinux core team for turning around patched builds for every supported release on disclosure day, and to ALESCo for moving quickly to approve shipping ahead of upstream. And thank you in advance to everyone in the community who helps us test these kernels — that’s the part that gets them safely into production.

Stay informed

Remaining aware of these vulnerabilities and acting quickly can keep your system and data safe. Follow the AlmaLinux Blog, join the Mattermost Community Chat, and subscribe to Announce and Security Mailing List to stay informed and updated. We will update this post when the patched kernels move from testing to production.

بروز بمانید!