CopyFail was not disclosed to Gentoo developer

· systems security devtools · Source ↗

TLDR

  • CVE-2026-31431 (CopyFail) is a local privilege escalation in the Linux kernel since 4.14, fixed in 6.18.22, 6.19.12, and 7.0, but LTS branches 6.12 and older remain unpatched.

Key Takeaways

  • Introduced in 2017 via commit 72548b093ee38a6d4f2a19e6ef1948ae05c181f7; affects every kernel from 4.14 through current LTS lines (6.12, 6.6, 6.1, 5.15, 5.10).
  • Fixes landed April 11 in stable kernels; backporting to older LTS is non-trivial due to API changes in the authencesn/IPSec/AF_ALG subsystem.
  • Gentoo shipped a workaround patch (0001-crypto-disable-authencesn-module-for-CVE-2026-31431.patch) disabling the authencesn crypto module as the lesser evil.
  • Linux kernel security process does not notify distributions by default; that only happens if the reporter explicitly cc’s the linux-distros mailing list, which did not occur here.
  • Described by oss-security participants as one of the worst make-me-root kernel vulnerabilities in recent memory.

Hacker News Comment Review

  • Core debate: blame falls on the kernel security team’s process, not the reporter. The kernel has full-time corporate-backed developers and should own downstream distribution notification.
  • Practical mitigations exist now: an eBPF-based workaround for systems where AF_ALG is built into the kernel (not a module) is already running in production; systems without algif_aead loaded may not be immediately exploitable.
  • The incident resurfaces the longstanding argument that nosuid/nodev should be default mount options, and that SUID binaries on arbitrary block devices are a systemic risk independent of this CVE.

Notable Comments

  • @whatevaa: “Stop blaming the reporter. Start asking kernel to fix their process.”
  • @GranPC: Published eBPF mitigation at Dabbleam/CVE-2026-31431-mitigation, claims no unexpected side-effects in production.
  • @Skywalker13: Debian bookworm/bullseye servers without algif_aead loaded are not immediately at risk.

Original | Discuss on HN