Skip to Content
Informational

Informational

Advisory: Linux Kernel LPE - Copy Fail (CVE-2026-31431)

CVE(S)

CVE-2026-31431

PRODUCT(S)

Cloud Optix

Sophos Endpoint

Sophos Central

Sophos Email

Sophos Firewall

Sophos Home

Sophos RED

Sophos Switch

Sophos UTM

Sophos Wireless

SophosLabs Intelix

Updated

2026 May 1

Article Version

1

First Published

2026 May 1

Publication ID

sophos-sa-20260501-copyfail

Workaround

No

Overview

On 29 April 2026, a high-severity vulnerability identified as CVE-2026-31431, also referred to as “Copy Fail”, was publicly disclosed in the Linux kernel. The vulnerability affects the algif_aead component of the kernel’s cryptographic subsystem and is associated with improper handling of in-place operations in the AF_ALG userspace crypto interface. Exploitation requires access to the AF_ALG userspace crypto interface.

The flaw allows a local unprivileged user to perform a controlled write into the kernel page cache of a readable file. Under certain conditions, this can be leveraged to modify the in-memory representation of setuid binaries and achieve local privilege escalation to root.

The issue originates from a logic flaw introduced in 2017 and affects a wide range of Linux kernel versions used across major distributions. Fixes have been released in updated kernel versions that revert the affected behaviour.

Are Sophos products affected?

The following products have been reviewed against the CVE-2026-31431:

Product or ServiceStatusDescription
TaegisNot affectedVulnerable code not in execute path
Cloud OptixNot affectedVulnerable code not in execute path
SG UTM (all versions)Not affectedVulnerable code not in execute path
Sophos CentralNot affectedVulnerable code not in execute path
Sophos Endpoint Protection (Windows)Not affectedComponent not present
Sophos Endpoint Protection (macOS)Not affectedComponent not present
Sophos Endpoint Protection (Linux)Not affectedComponent not present
Sophos EmailNot affectedVulnerable code not in execute path
Sophos Firewall (all versions)Not affectedVulnerable code not in execute path
SophosConnect ClientNot affectedComponent not present
Sophos Home (Windows)Not affectedComponent not present
Sophos Home (MacOS)Not affectedComponent not present
SophosLabs IntelixNot affectedVulnerable code not in execute path
Sophos MobileNot affectedVulnerable code not in execute path
Sophos Mobile EAS ProxyNot affectedVulnerable code not in execute path
Sophos Mobile Control app (iOS + Android)Not affectedComponent not present
Sophos Intercept X for Mobile app (iOS + Android)Not affectedComponent not present
Sophos Secure Email app (iOS + Android)Not affectedComponent not present
Sophos Secure Workspace app (iOS + Android)Not affectedComponent not present
Sophos Chrome SecurityNot affectedComponent not present
Sophos REDNot affectedVulnerable code not in execute path
Sophos AP/APX (SFOS Managed)Not affectedVulnerable code not in execute path
Sophos AP/APX (Central Managed)Not affectedVulnerable code not in execute path
Sophos WirelessNot affectedVulnerable code not in execute path
Sophos DNS ProtectionNot affectedVulnerable code not in execute path
SUSINot affectedComponent not present
AV Engine (all platforms)Not affectedComponent not present


Related information:

Sophos Logo

Sophos Responsible Disclosure Policy

To learn about Sophos security vulnerability disclosure policies and publications, see the Responsible Disclosure Policy.