Tech News

CopyFail on Linux: Are Security Patches Available?

The security flaw CVE-2026-31431, also known as CopyFail, was disclosed on April 29, 2026. This publication appears to have caught the maintainers of various Linux distributions off guard. Where do things stand regarding the release of fixes? Let’s take stock.

As a reminder, this Local Privilege Escalation (LPE) vulnerability, present in the Linux kernel cryptographic subsystem (the algif_aead module) since 2017, allows an unprivileged user to become root. It can be exploited locally, but also remotely if it is combined with another vulnerability present in an application (an out-of-date CMS, a vulnerable plugin, etc.).

It is strongly recommended to protect Linux machines against this vulnerability, but are the patches ready? The situation is improving, even if not all fixes are online yet. Here is a summary.

Linux kernel versions affected by CopyFail

Linux kernel 7.0 is not vulnerable to the security flaw CopyFail. But, more broadly, it affects many versions, including LTS releases, and therefore many Linux distributions by extension.

The good news is that Linux kernel versions with long-term support (LTS) have already received a fix. Here are the updated versions that include this patch:

  • 6.12 LTS series: fixed in version 6.12.85
  • 6.6 LTS series: fixed in version 6.6.137
  • 6.1 LTS series: fixed in version 6.1.170
  • 5.15 LTS series: fixed in version 5.15.204
  • 5.10 LTS series: fixed in version 5.10.254

Warning: distributions using end-of-life (EOL) kernels, such as Linux 6.17 or 6.19 (like Ubuntu 25.10, for example), are also vulnerable to this flaw.

CopyFail patches for Linux distributions

This vulnerability affects the Linux kernel, and the problem is that the version used varies from one distribution to another. I would even say from one distribution release to another. As a result, maintainers must backport the security fix to the Linux kernel used by their distribution, without neglecting testing phases, especially. This is all the more true because the security fix was initially pushed in a Release Candidate version of Linux kernel 7.0 (still very little used).

The table below may change at any time, but here is the current status as of Tuesday, May 5, 2026.

DistributionAffected versionsPatch available?Patched version / SolutionLink
DebianBullseye (11),
Bookworm (12),
Trixie (13),
Sid
Yes5.10.251-3 (Bullseye),
6.1.170-1 (Bookworm),
6.12.85-1 (Trixie),
7.0.3-1 (Sid).
Debian Security Tracker
UbuntuAll versions before 26.04 (Resolute)Yes (kmod mitigation + kernel in progress)The kernel fix is being rolled out.An update to the kmod package has been pushed to disable the vulnerable module.Ubuntu Security Blog
AlmaLinuxAlmaLinux 8, 9 and 10Yes4.18.0-553.121.1.el8_10 (v8),
5.14.0-611.49.2.el9_7 (v9),
6.12.0-124.52.2.el10_1 (v10).
AlmaLinux Blog
FedoraFedora 42/43YesUpdated to kernels: 6.18.22+, 6.19.12+ and 7.0+.Fedora Discussion
Arch LinuxRolling Release / LTSYesKernel 6.19.12-1 and LTS 6.18.26-1.Arch Linux Security
Red Hat (RHEL), CentOS, Rocky LinuxRHEL 8, 9, 10 and derivatives.Yes, for some versions.RHEL patch 10 released on May 5, 2026,
RHEL patch 9 released on May 4, 2026,
For other versions, fixes are pending.In the meantime, Red Hat and Rocky Linux recommend adding this boot argument: initcall_blacklist=algif_aead_init.
Red Hat CVE / Rocky Forum

CopyFail patches for NAS systems

The situation on NAS devices is more mixed because it depends on the hardware architecture and the Linux kernel integrated by the vendor. Here is some initial information on this subject for QNAP, Synology and ASUSTOR.

ManufacturerSystem / VersionsPatch available?Status / Mitigation versionLink to official resource
QNAPQTSNoOnly ARM64 models running QTS are vulnerable, especially those with Linux kernel 5.10.QNAP Security Advisory
SynologyDSM is not affected by this vulnerability.---
ASUSTORADMPending, no information found on the web.--

Installing the CopyFail patch on Debian 13

Finally, let’s look at how to install the CopyFail patch on a Debian 13 machine. Note that installing the security fix requires a reboot (since the change affects the kernel).

You must update the package cache and apply upgrades:

sudo apt update && sudo apt upgrade

This will install the latest available updates. In the case of Debian 13, the patched version is: 6.12.85-1. To find out the Linux kernel version currently loaded on your machine, run this command:

uname -r
6.12.74+deb13+1-cloud-amd64

Here, we can see: 6.12.74. This is not the expected version. However, it may simply be a pending reboot... You can check with this command:

dpkg -l | grep linux-image
ii  linux-image-6.12.74+deb13+1-cloud-amd64 6.12.74-2                            amd64        Linux 6.12 for x86-64 cloud (signed)
ii  linux-image-6.12.85+deb13-cloud-amd64   6.12.85-1                            amd64        Linux 6.12 for x86-64 cloud (signed)
ii  linux-image-cloud-amd64                 6.12.85-1                            amd64        Linux for x86-64 cloud (meta-package)

There are indeed two lines referring to the expected version: 6.12.85-1. The ii status at the beginning of the line means the version has been installed and configured, but the reboot is still missing. Reboot and then check the kernel version. It should be better!

sudo reboot

uname -r
6.12.85+deb13-cloud-amd64

There you have it: you now have the patch for the CopyFail security flaw on your Debian machine.

If you want to add extra information for a specific OS or product, feel free to comment on this article.

author avatar
Florian Burnel Co-founder of IT-Connect
Systems and network engineer, co-founder of IT-Connect and Microsoft MVP "Cloud and Datacenter Management". I'd like to share my experience and discoveries through my articles. I'm a generalist with a particular interest in Microsoft solutions and scripting. Enjoy your reading.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.