GHSA-m38g-vww2-mvgx: Talos Linux has a local privilege escalation from untrusted workloads
A vulnerability in the Linux kernel’s algif_aead subsystem (CVE-2026-31431, “copy.fail”) allows an unprivileged container workload to corrupt arbitrary file page-cache pages via the AF_ALG crypto interface and splice(). On Talos Linux, this vulnerability can be chained into a complete node compromise: an attacker who can schedule a pod on a worker node can, without any elevated Kubernetes permissions, achieve arbitrary code execution as root on the host (by poisoning a binary inside a privileged pod, or poisoning a binary which runs with elevated privileges like a CNI binary), access host filesystem, including node secrets.
The exploit does not require kernel debugging, race conditions, or any prior privileges beyond the ability to create a pod.
References
- github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC
- github.com/advisories/GHSA-m38g-vww2-mvgx
- github.com/siderolabs/talos
- github.com/siderolabs/talos/security/advisories/GHSA-m38g-vww2-mvgx
- github.com/theori-io/copy-fail-CVE-2026-31431
- nvd.nist.gov/vuln/detail/CVE-2026-31431
- xint.io/blog/copy-fail-linux-distributions
Code Behaviors & Features
Detect and mitigate GHSA-m38g-vww2-mvgx with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →