Sansec logo

Linux Copy Fail - CVE-2026-31431

Sansec

by Sansec

Published in Guides

On April 29th 2026, researchers at Xint Code published Copy Fail (CVE-2026-31431), a critical Linux kernel vulnerability that lets any local user gain root. The flaw has been present in mainline kernels since 2017 and affects all major distributions, including Ubuntu, Amazon Linux, RHEL, and SUSE.

eComscan will alert if your server is running a kernel that is vulnerable to Copy Fail. In most situations, the fix can only be applied by your server administrator / hosting provider.

Risk for ecommerce stores

Copy Fail requires local code execution to be useful, so a single-user dedicated server is at lower risk. However, the flaw is dangerous on:

  • Multi-tenant hosting and shared servers
  • Containers and Kubernetes clusters
  • CI/CD runners and build hosts
  • Any system where untrusted PHP, plugins, or extensions can run

If an attacker first lands a webshell through, for example, a vulnerable Magento extension, Copy Fail lets them escalate from the web user to full root and disable any host-level security tooling. Attackers may then easily gain administrator access, which makes it extremely hard to detect their presence.

How to check

The vulnerability is in the kernel crypto subsystem (algif_aead), reachable through AF_ALG sockets. It was fixed in mainline commit a664bf3d603d.

Check whether your distribution has shipped a patched kernel and reboot into it. Most distros published updates around the disclosure date.

Mitigation

Mitigation requires administrator access, so typically your hosting provider should fix this.

The fastest mitigation, even before patching, is to disable the vulnerable module:

echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
rmmod algif_aead 2>/dev/null || true

Disabling algif_aead has no impact on regular ecommerce workloads. Only specialised software that explicitly uses the kernel AF_ALG crypto API is affected.

For container hosts running untrusted workloads, also block AF_ALG socket creation through seccomp.

After mitigation, schedule a kernel upgrade and reboot at your earliest convenience. We strongly recommend enabling automatic security updates on your servers.

More information

Need expert advice? We are here to help!

Stay up to date with the latest eCommerce attacks

Sansec logo

experts in eCommerce security

Terms & Conditions
Privacy & Cookie Policy