Local Privilege Escalation Vulnerability
On 29 April 2026, a high local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-31431 and named “Copy Fail”, was publicly disclosed. The vulnerability affects Manjaro Linux since 2017. A public proof-of-concept exploit has been released.
The release manager has patched most of the kernels and released them to the testing and unstable branches:
Temporary Mitigation
Disable the
algif_aeadkernel module persistently on all affected systems until a patched kernel is available:# echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf # rmmod algif_aead 2>/dev/null || trueThis workaround does not affect
dm-crypt/LUKS,kTLS, IPsec/XFRM, OpenSSL, GnuTLS, NSS, or SSH. It may affect applications explicitly configured to use theafalgengine or that bindaead/skcipher/hashsockets directly. Exposure can be assessed withlsof | grep AF_ALG.– CERT-EU - High Vulnerability in the Linux Kernel (“Copy Fail”)
If you check your exposure - first sync lsof-package to your system pacman -Syu lsof.
What you can do
If you think you are a target for an exploit like this, consider switching to testing branch.
sudo pacman-mirrors -aS testing && sudo pacman -Syyu
If testing or unstable branch is not an option then consider building a temporary kernel for your system
Alert your system administrator
If you are part of a multi-user system running on Manjaro stable branch and kernel 6.18.18 consider informing the administrator responsible for the server you are connecting to.
Community kernel
Use the kernel on your own responsibility.
No efforts has been made to ensure compatibility with any extra-modules
No efforts has been made to ensure compatibility with Nvidia GPU drivers
The kernel exist side-by-side with the official 6.18 kernel and must be maintained separately.
No updates to the patch will be provided and you must manually switch back when stable branch receives a patched kernel.
You can get the community kernel for stable branch from https://manjaro.dk/kernel/.
sudo pacman -U https://manjaro.dk/kernel/linux618-patch-6.18.26-1-x86_64.pkg.tar.zst
A header package is also available should you require it.
The packages are signed using a valid Manjaro Linux signing key. The key belongs to Frede Hundewadt AKA @linux-aarhus.