CVE-2026-31431 "Copy Fail" Linux Vulnerability
May 7, 2026
Alerted Vulnerabilities
On April 30, 2026, the "Copy Fail" vulnerability CVE-2026-31431 was reported to the Wind River PSIRT Team. A flaw was found in the Linux kernel's algif_aead cryptographic algorithm interface. An incorrect 'in-place operation' was introduced, where the source and destination data mappings were different. This could lead to unexpected behavior or data integrity issues during cryptographic operations, potentially impacting the reliability of encrypted communications. https://www.cve.org/CVERecord?id=CVE-2026-31431
Additionally, on May 1, 2026 the Cybersecurity and Infrastructure Agency (CISA) reported CVE-2026-31431 in the Known Exploited Vulnerabilities (KEV) database, escalating this vulnerability to a High-Profile PSIRT case. https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431
Wind River Affected Products
- eLxr Pro - All Versions
- Wind River Linux - All Versions
- Wind River Studio Developer - Limited impact
- Wind River Cloud Platform - Limited impact
Impacted Products
No other Wind River Products use the Linux Kernal and are not impacted by this vulnerablity.
Mitigations
Wind River recommends officially updated packages and distros in the Remediation Section below, while the community has identified a possible work around listed here:
Source: https://cert.europa.eu/publications/security-advisories/2026-005/
Disable the algif_aead kernel module persistently on all affected systems until a patched kernel is available:
echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
rmmod algif_aead 2>/dev/null || true
This workaround does not affect dm-crypt/LUKS, kTLS, IPsec/XFRM, OpenSSL, GnuTLS, NSS, or SSH. It may affect applications explicitly configured to use the afalg engine or that bind aead/skcipher/hash sockets directly. Exposure can be assessed with lsof | grep AF_ALG.
Remediation
The fix for this vulnerability has been identified: https://lore.kernel.org/openembedded-core/?q=CVE-2026-31431
Wind River Engineering teams are staging and testing product updates with the upstream fix and projected timelines according to the each product's impact:
- eLxr Pro: Kernel updated build to be released to mirror package feeds estimated imminently
- Wind River Linux: Kernel Update to be included in the next Hot Fix / RCPL
- Wind River Studio Developer: Kernel Update in the Next patch release
- Wind River Cloud Platform: Kernel update in the Next patch release
Next Steps
Please visit the Wind River Security Center for ongoing updates at https://www.windriver.com/security.
Additional Resources
Please access these additional resources for these and all vulnerabilities:
- Wind River Security Center
- Wind River Product CVE Database
- Product-Specific Security Alerts and RSS Subscription
Wind River customers with additional questions about these vulnerabilities should contact Wind River Customer Support or their local Wind River sales representative for more information. If you own a device that may be impacted by these vulnerabilities, please contact your device manufacturer.