Share via

CVE-2026-31431 (Copy Fail) - mitigation status for App Service on Linux and Linux Function Apps

Sergey Nosov 1 Reputation point
2026-05-07T15:25:08.6+00:00

Looking for a per-service statement on CVE-2026-31431 (algif_aead "Copy Fail", CVSS 7.8) for Azure App Service on Linux and Linux Function Apps. Microsoft has published an explicit advisory for AKS, but nothing yet for App Service or Functions on Linux hosts.

What is public so far:

  • AKS bulletin AKS-2026-0003 (2026-05-01) names the modprobe mitigation install algif_aead /bin/false and identifies fixed node image versions v202604.13.0 and v202604.24.0. Tracking issue:

github.com/Azure/AKS/issues/5753.

  • Microsoft Security Blog post (2026-05-01): generic CVE explainer plus Defender / MDVM signatures, no per-service guidance.
  • No MSRC Security Update Guide entry. No App Service Linux or Functions advisory.

Three concrete questions:

  1. Has the algif_aead modprobe mitigation (or a kernel patch) been applied to the App Service Linux host fleet that runs Linux App Service Plans and Linux Function Apps? If yes, on what date or for which platform versions?
  2. Is the App Service routine maintenance event currently in progress (East US, window 2026-04-29 19:49 UTC through 2026-05-13 19:49 UTC) the vehicle for this mitigation, or unrelated?
  3. Will a per-service advisory be published, or is AKS-2026-0003 considered the canonical reference for all Microsoft-managed Linux fleets?

A public statement we can cite would let customers close out their internal risk register entries without inferring from the AKS material.

Azure App Service
Azure App Service

Azure App Service is a service used to create and deploy scalable, mission-critical web apps.


2 answers

Sort by: Most helpful
  1. Praneeth Maddali 9,515 Reputation points Microsoft External Staff Moderator
    2026-05-08T14:36:40.2233333+00:00

    Hi @Sergey Nosov

    Thank you for your follow‑up.

    Yes — for Azure Container Apps, the same shared responsibility and platform-managed security model applies. The service abstracts the underlying infrastructure, and Microsoft manages the platform, including security controls and isolation of workloads.
    User's image

    As per the official documentation:

    • Azure Container Apps provides built‑in security features such as identity, secrets management, and network security to help protect workloads
    • The service is designed so you can run containers without managing the underlying infrastructure, reducing exposure to host-level components

    Reference:

    https://learn.microsoft.com/en-us/azure/container-apps/security

    https://learn.microsoft.com/en-us/azure/container-apps/secure-deployment

    https://learn.microsoft.com/en-us/azure/container-apps/overview

    If the answer is helpful,  Please do click "Accept the answer” and Yes, this can be beneficial to other community members.

    If you have any other questions, let me know in the "comments" and I would be happy to help you

     

    Was this answer helpful?

    0 comments No comments

  2. Praneeth Maddali 9,515 Reputation points Microsoft External Staff Moderator
    2026-05-07T22:08:57.2933333+00:00

    Hi @Sergey Nosov

    Thank you for the detailed question and for sharing the AKS advisory context — I understand you're looking for a clear, service-level position for CVE‑2026‑31431 (“Copy Fail”) in Azure App Service on Linux / Linux Function Apps.
    How this applies to App Service (Linux)

    Azure App Service is a fully managed PaaS offering, so the underlying host OS and kernel are not customer-managed. Microsoft is responsible for applying security updates and mitigations at the platform level.

    Azure manages OS patching for both the physical servers and the VMs hosting App Service, and updates are applied automatically using safe deployment practices.

    For high‑priority vulnerabilities (including kernel issues), patches are handled on a case‑by‑case basis and deployed transparently by Microsoft.

    About this CVE and risk context

    • This is a Linux kernel local privilege escalation vulnerability, meaning exploitation requires prior local code execution (for example, within a container or application process).

    In App Service:

    • Apps run inside isolated containers
    • Customers don’t have access to the host kernel or module controls
    • The platform enforces additional isolation boundaries

    This significantly reduces the exposure unless there is a separate application-level vulnerability allowing code execution.About the AKS advisory (clarification)

    You also referenced the AKS bulletin, which is a good reference point:

    https://learn.microsoft.com/en-us/azure/aks/security-bulletins/overview?tabs=aks-node-image%2Caks-cluster%2Caks-addons

    This document shows how Microsoft mitigates kernel vulnerabilities (for example, via node image updates or configuration changes). In many cases:

    Fixes are rolled out automatically, and no customer action is required.

    However, this guidance is specific to AKS. For App Service, Microsoft doesn’t publish the exact mitigation mechanism or rollout timing for security reasons.

    What you should do (clear recommendation)

    For App Service customers:

    • No host-level action is required (you cannot patch or modify the kernel)
    • Continue standard security best practices:
      • Avoid executing untrusted code in your application
      • Keep your app dependencies or container images updated
      • Use monitoring (Defender, logs) for abnormal behavior detection

    reference:

    https://learn.microsoft.com/en-us/azure/app-service/overview-patch-os-runtime

    User's image

    User's image

    User's image

    https://www.microsoft.com/en-us/security/blog/2026/05/01/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation/

    https://learn.microsoft.com/en-us/azure/aks/security-bulletins/overview?tabs=aks-node-image%2Caks-cluster%2Caks-addons

    If the answer is helpful,  Please do click "Accept the answer” and Yes, this can be beneficial to other community members.

    If you have any other questions, let me know in the "comments" and I would be happy to help you

     

    Was this answer helpful?


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.