Context
Red Hat Security Bulletin RHSB-2026-02 / CVE-2026-31431 (CVSS 7.8 Important, CWE-1288) is a Linux kernel algif_aead in-place operation flaw allowing local privilege escalation via an unprivileged AF_ALG socket + splice() chain ("Copy Fail"). In containerized environments the shared host page cache enables pod-to-node escape.
Workload-side defense-in-depth and host-side documentation landed in:
- c085dc0 — seccomp: block
splice and socket() (which denies AF_ALG) at both subprocess BPF and container SeccompProfile layers
- 6c8a60a —
chart/README.md host requirements + Red Hat product status table
- 1151cf4 —
chart/policies/copy-fail-mitigation-policy.yaml from Red Hat solution 7142032
What this issue tracks
Items we deliberately deferred because they depend on Red Hat shipping errata:
Red Hat product status as of 2026-05-04
| Product |
Component |
State |
Errata |
| RHEL 9 |
kernel |
Fixed |
RHSA-2026:13565 |
| RHEL 9 |
kernel-rt |
Affected |
none |
| RHEL 8 |
kernel |
Affected |
none |
| RHEL 8 |
kernel-rt |
Affected |
none |
| RHEL 10 |
kernel |
Affected |
none |
| OpenShift Container Platform 4 |
rhcos |
Affected |
none |
Follow-ups once errata ship
Optional, separate follow-up
References
Context
Red Hat Security Bulletin RHSB-2026-02 / CVE-2026-31431 (CVSS 7.8 Important, CWE-1288) is a Linux kernel
algif_aeadin-place operation flaw allowing local privilege escalation via an unprivileged AF_ALG socket +splice()chain ("Copy Fail"). In containerized environments the shared host page cache enables pod-to-node escape.Workload-side defense-in-depth and host-side documentation landed in:
spliceandsocket()(which denies AF_ALG) at both subprocess BPF and container SeccompProfile layerschart/README.mdhost requirements + Red Hat product status tablechart/policies/copy-fail-mitigation-policy.yamlfrom Red Hat solution 7142032What this issue tracks
Items we deliberately deferred because they depend on Red Hat shipping errata:
Red Hat product status as of 2026-05-04
Follow-ups once errata ship
chart/README.mdtable.chart/policies/copy-fail-mitigation-policy.yamlis still recommended for fleets that have rolled the new RHCOS, or whether the file should be retained only as historical reference.Optional, separate follow-up
initContainerthat reads/proc/cmdlineand refuses to start when the host kernel is unpatched andinitcall_blacklist=algif_aead_initis absent. Deferred because it can race node config drift; tracked here so the conversation is not lost.References