Copy Fail

Copy Fail

Affected software: Added clarity

← Previous revision Revision as of 22:32, 1 May 2026
Line 34: Line 34:
Many distributions and security sources recommended mitigating the issue via disabling the affected algif_aead [[kernel module]]. As of May 1st 2026, some distributions have released a patched kernel, while others have not.{{cite web |last1=Stanescu |first1=Luci |title=Fixes available for CVE-2026-31431 (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability |url=https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available |website=Ubuntu Blog |publisher=Ubuntu |access-date=1 May 2026 |language=en}}{{cite web |title=CVE-2026-31431 |url=https://security-tracker.debian.org/tracker/CVE-2026-31431 |website=security-tracker.debian.org |publisher=Debian |access-date=1 May 2026}}
Many distributions and security sources recommended mitigating the issue via disabling the affected algif_aead [[kernel module]]. As of May 1st 2026, some distributions have released a patched kernel, while others have not.{{cite web |last1=Stanescu |first1=Luci |title=Fixes available for CVE-2026-31431 (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability |url=https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available |website=Ubuntu Blog |publisher=Ubuntu |access-date=1 May 2026 |language=en}}{{cite web |title=CVE-2026-31431 |url=https://security-tracker.debian.org/tracker/CVE-2026-31431 |website=security-tracker.debian.org |publisher=Debian |access-date=1 May 2026}}


[[Mandatory access control|MAC]] mechanisms such as [[SELinux]] and [[AppArmor]] can mitigate the exploit, but only when they are configured so that only legitimately required services are granted access to the AF_ALG socket family. In default configurations, any unconfined or broadly permitted process can still open AF_ALG sockets, so the protection is effectively absent and the exploit remains reachable.
According to [[GrapheneOS]], [[Android (operating system)|Android]] is unaffected due to its use of [[SELinux]] policies, where only the dumpstate process is permitted to create AF_ALG sockets.{{Cite web |author=GrapheneOS |date=30 April 2026 |title=GrapheneOS is protected against Copy Fail and similar vulnerabilities by SELinux |url=https://discuss.grapheneos.org/d/35110-grapheneos-is-protected-against-copy-fail-and-similar-vulnerabilities-by-selinux |access-date=30 April 2026 |website=discuss.grapheneos.org}}

According to [[GrapheneOS]], [[Android (operating system)|Android]] is unaffected due to its use of [[SELinux]] policies, where only the dumpstate process (used for bug reports) is permitted to create AF_ALG sockets.{{Cite web |author=GrapheneOS |date=30 April 2026 |title=GrapheneOS is protected against Copy Fail and similar vulnerabilities by SELinux |url=https://discuss.grapheneos.org/d/35110-grapheneos-is-protected-against-copy-fail-and-similar-vulnerabilities-by-selinux |access-date=30 April 2026 |website=discuss.grapheneos.org}}


== References ==
== References ==