← All briefs
critical May 5, 2026

Copy Fail: CVE-2026-31431: Linux Kernel LPE via AF_ALG Page Cache Corruption

Source report →

On April 29, 2026, Theori disclosed CVE-2026-31431 ("Copy Fail"), a local privilege escalation in the Linux kernel's authencesn cryptographic template. The flaw requires no race condition, no compiled payload, and no elevated privileges — a single Python script roots Ubuntu, Amazon Linux, RHEL, SUSE, and every distribution carrying the 2017 commit without the revert. CVSS 3.1 is 7.8 (High). The patch (mainline a664bf3d603d) was available April 1, 2026; downstream availability remains uneven as of disclosure.

The exploit writes 4 bytes into the page cache of a setuid binary or /etc/passwd via AF_ALG sendmsg+splice cycles — the on-disk file is never touched, making file integrity tools blind. Because the page cache is shared across container namespaces on the same host, this is also a container-escape primitive. Go and Rust variants are already circulating, making language-agnostic kernel and syscall signals the primary detection layer.

SHA256 FILE HASH 1
a567d09b15f6e4440e70c9f2aa8edec8ed59f53301952df05c719aa3911687f9
FILE NAME 3
copy_fail_exp.py
exploit_cve_2026_31431.py
test_cve_2026_31431.py
URL 2
https://copy.fail/exp
https://github.com/theori-io/copy-fail-CVE-2026-31431

Detections (1)

Enable detections →

Connect your environment for suggestions and queries personalized to your security telemetry.

  • Detect Python scripts executing from non-standard locations or with network activity