We are providing an update on the mitigation for the Critical Linux Kernel Vulnerability (CVE-2026-31431).
We have learned that the mitigation described in CVE-2026-31431 is not effective on all Linux-based instances. Specifically, machines running RHEL or SUSE operating systems are currently not supported. As the respective OS providers have not yet released the required patches, we are recommending the following steps:
python3 -c "
import socket, sys
try:
s = socket.socket(socket.AF_ALG, socket.SOCK_SEQPACKET, 0)
s.bind(('aead', 'authencesn(hmac(sha256),cbc(aes))'))
print('VULNERABLE - continue with next steps')
sys.exit(1)
except OSError as e:
print('Not vulnerable:', e)
sys.exit(0)
"
2. Add a kernel parameter of initcall_blacklist=algif_aead_init to /etc/default/grub:
sed -i "s|^\(GRUB_CMDLINE_LINUX=\".*\)\"\s*$|\1 initcall_blacklist=algif_aead_init\"|" /etc/default/grub
3. Check the result:
grep GRUB_CMDLINE_LINUX /etc/default/grub
GRUB_CMDLINE_LINUX="... initcall_blacklist=algif_aead_init"
Fix manually if necessary
4. Update GRUB configuration:
grub2-mkconfig -o /boot/grub2/grub.cfg
5. Reboot the machine:
reboot -h now
6. Check again with the first script
For instance, running Debian or Ubuntu, mitigation can be applied by installing the latest available kernel version and rebooting the machine.