Skip to main content
Mallory

Linux Kernel Privilege Escalation CVE-2026-31431 Draws Patch and PoC Activity

proof-of-concept-releaseendpoint-software-vulnerabilitywidely-deployed-product-advisoryrapid-weaponization
Updated May 1, 2026 at 04:01 PM6 sources
Share:
Linux Kernel Privilege Escalation CVE-2026-31431 Draws Patch and PoC Activity

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

CVE-2026-31431 is a Linux kernel flaw classified as CWE-669: Incorrect Resource Transfer Between Spheres that can enable local privilege escalation to root and, in some cases, bypass isolation boundaries. The Canadian Centre for Cyber Security warned that the impact becomes more severe when the bug is chained with a remote code execution vulnerability, and urged organizations to identify exposed systems, apply vendor fixes, reboot after kernel updates, restrict access, enforce kernel security controls, monitor logs, and segment high-risk or Internet-facing workloads.

Vendor and community activity indicates broad exposure across modern Linux platforms. Red Hat lists RHEL 8, RHEL 9, RHEL 10, and corresponding kernel-rt packages as affected, while RHEL 6 and RHEL 7 are marked not affected because the vulnerable code is absent. Public exploit interest accelerated after Theori published the "Copy Fail" technical write-up and proof-of-concept repository, which references testing on Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, and SUSE 16; Rocky Linux also published related errata, signaling downstream patch availability in enterprise Linux ecosystems.

Timeline

  1. Apr 30, 2026

    Canada issues national alert on Linux vulnerability CVE-2026-31431

    The Canadian Centre for Cyber Security published Alert AL26-009 warning that CVE-2026-31431 could enable privilege escalation to root or bypass isolation mechanisms on vulnerable Linux systems. The alert stressed higher risk when chained with remote code execution and urged organizations to identify affected systems, apply patches, reboot, and harden exposed workloads.

  2. Apr 29, 2026

    Public PoC and technical write-up for CVE-2026-31431 released

    A GitHub repository by theori-io published a technical write-up and proof-of-concept exploit for 'Copy Fail' (CVE-2026-31431), including exploit code and tested kernel/distribution details. The repository quickly drew broad public attention, indicating active security community interest in exploitation details.

  3. Jan 5, 2026

    Red Hat lists OpenShift 4 rhcos as affected by CVE-2026-31431

    Red Hat's CVE page identifies Red Hat OpenShift Container Platform 4 rhcos as affected by CVE-2026-31431, expanding the known impact beyond the RHEL kernel packages already noted. The same page continues to mark RHEL 6, RHEL 7, and RHEL 7 kernel-rt as not affected because the vulnerable code is not present.

  4. Jan 5, 2026

    Red Hat marks RHEL 8, 9, and 10 kernel packages as affected

    Red Hat's product impact matrix for CVE-2026-31431 states that RHEL 8, RHEL 8 kernel-rt, RHEL 9, RHEL 9 kernel-rt, and RHEL 10 kernel are affected, while RHEL 6, RHEL 7, and RHEL 7 kernel-rt are not affected because the vulnerable code is not present.

  5. Jan 5, 2026

    Rocky Linux publishes errata for CVE-2026-31431

    Rocky Linux issued product errata RLSA-2026:12265 and RLSA-2026:12271 related to CVE-2026-31431, indicating vendor remediation activity for affected systems.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

April 29, 2026 at 12:00 AM
January 5, 2026 at 12:00 AM
January 5, 2026 at 12:00 AM
January 5, 2026 at 12:00 AM

1 more from sources like redhat access

Related Stories

Ransomware Exploitation of Linux Kernel CVE-2024-1086 Privilege Escalation Flaw

Ransomware Exploitation of Linux Kernel CVE-2024-1086 Privilege Escalation Flaw

CISA has confirmed that ransomware groups are actively exploiting a high-severity privilege escalation vulnerability in the Linux kernel, tracked as CVE-2024-1086. This use-after-free flaw, present in the netfilter: nf_tables component and introduced in 2014, was patched in January 2024 but remains a significant risk for unpatched systems. Successful exploitation allows attackers with local access to escalate privileges to root, enabling full system takeover, disabling of security defenses, installation of malware, and lateral movement within networks. The vulnerability affects a wide range of major Linux distributions, including Debian, Ubuntu, Fedora, and Red Hat, across kernel versions from 3.15 to 6.8-rc1. In March 2024, a security researcher published a detailed proof-of-concept exploit, further increasing the risk of widespread exploitation. CISA added CVE-2024-1086 to its Known Exploited Vulnerabilities (KEV) catalog in May 2024 and mandated that federal agencies secure affected systems by June 20, 2024. Despite the availability of a patch, ransomware campaigns have begun leveraging this flaw, though CISA has not disclosed specific threat actor identities or detailed attack campaigns. Security experts recommend immediate patching, or if not possible, implementing mitigations such as blocklisting 'nf_tables', restricting user namespace access, or loading the Linux Kernel Runtime Guard (LKRG) module. The public availability of exploit code and the broad impact across Linux environments underscore the urgency for organizations to address this vulnerability to prevent ransomware-driven compromise and data theft.

1 months ago
Microsoft Discloses Broad Set of Linux Kernel Vulnerabilities

Microsoft Discloses Broad Set of Linux Kernel Vulnerabilities

Microsoft published a broad batch of Security Update Guide entries for Linux kernel flaws affecting memory management, networking, virtualization, device drivers, and subsystem input validation. The listed issues include use-after-free, NULL dereference, integer underflow, refcount underflow, information disclosure, and bounds-checking failures tracked as **`CVE-2026-31496`**, **`CVE-2026-31458`**, **`CVE-2026-31689`**, **`CVE-2026-31615`**, **`CVE-2026-31664`**, **`CVE-2026-31656`**, **`CVE-2026-31611`**, **`CVE-2026-31671`**, **`CVE-2026-31612`**, and others. Affected components span `nf_conntrack_expect`, `damon`, `edac_mc`, `renesas_usb3`, `xfrm`, `drm/i915`, `ksmbd`, `stmmac`, `tipc`, `mptcp`, `NFC`, `HID`, `KVM`, `mmc`, `x86/CPU`, `PCI endpoint`, `blk-cgroup`, `media/as102`, and `altera-tse`. Several entries point to bugs that could lead to kernel crashes, memory corruption, or data leakage if triggered through malformed input, protocol handling, or device interaction. Notable examples include a slab use-after-free in `mptcp`, information leaks in `xfrm_user` and `xfrm`, validation flaws in `ksmbd`, endpoint index handling in `usb: gadget: renesas_usb3`, and multiple underflow and teardown-ordering bugs across networking and driver code. The disclosures indicate a coordinated publication of upstream Linux kernel fixes through Microsoft's advisory channel, underscoring the need for organizations running Linux workloads in Microsoft-connected environments to review affected kernel versions and apply vendor patches promptly.

4 days ago
March 2026 Vendor Security Advisories for Multiple Products

March 2026 Vendor Security Advisories for Multiple Products

Multiple vendors and agencies published **security advisories** covering newly addressed vulnerabilities across enterprise, Linux, and industrial control system products. The advisories include an **HPE Telco Service Orchestrator** remote buffer overflow affecting versions prior to `4.2.12`, broad **Red Hat** and **Ubuntu** Linux kernel updates, and a large set of **Dell** and **IBM** product fixes spanning storage, networking, cloud, identity, and security platforms. **CISA ICS** advisories also highlighted weaknesses in products from **Siemens, Honeywell, Lantronix, Trane, Ceragon, Apeman,** and **Inductive Automation**, indicating continued exposure across operational technology environments. A related technical disclosure from the **Zero Day Initiative** described **CVE-2022-32250**, a Linux kernel `nf_tables` use-after-free flaw that can allow local privilege escalation to **root** after low-privileged code execution, and noted that Linux distributions have issued updates. That Linux kernel issue aligns with the broader kernel patching activity reflected in the Ubuntu and Red Hat notices, but the overall reporting is not a single incident or exploit campaign; it is a roundup of routine but substantive vulnerability disclosures and remediation guidance. This content is **not fluff** because it contains specific vulnerability information, affected products, and actionable patching intelligence.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Linux Kernel Privilege Escalation CVE-2026-31431 Draws Patch and PoC Activity | Mallory