Skip to main content
institutional access

You are connecting from
Lake Geneva Public Library,
please login or register to take advantage of your institution's Ground News Plan.

Published loading...Updated

'An Hour of Scan Time Is All It Took': "Copy Fail" Flaw Impacts All Linux Kernels Released Since 2017, so Patch Now or Face the Consequences

The 732-byte exploit works without offsets or races and can alter setuid-root binaries to give attackers root on major Linux distributions.

  • Security researchers at Theori discovered CVE-2026-31431, a local privilege escalation flaw dubbed Copy Fail that affects Linux kernels released since 2017, allowing unprivileged users to gain root permissions.
  • Copy Fail stems from a logic bug in the Linux kernel's cryptographic template introduced in 2017, allowing an authenticated user to perform a "4-byte write in to the page cache of any readable file on the system."
  • Theori developed a 732-byte exploit that is "100% reliable. Script roots every Linux distribution shipped since 2017." Researchers confirmed the exploit on Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, and SUSE 16.
  • Tharros principal vulnerability analyst Will Dormann notes "Fedora 42 and newer have updates, but no official advisory or acknowledgement of CVE-2026-31431." Users can mitigate risks by disabling the algif_aead module until patches arrive.
  • Theori suggests treating multi-tenant Linux hosts, Kubernetes clusters, and cloud SaaS running user code as patching priorities. Securing shared kernel environments remains critical as a wave of new exploits is expected.
Insights by Ground AI

31 Articles

Lean Right

In the world of cybersecurity, even old vulnerabilities pose serious threats. One such vulnerability is the recently discovered Copy Fail. Through intuition, and after an hour of AI-powered scanning, cybersecurity researchers were able to identify and exploit a nine-year-old root escalation vulnerability that affects every Linux release since 2017. The vulnerability, dubbed “Copy Fail” by Xint researchers, is officially known as CVE-2026-31431. …

Read Full Article

Xint, the provider of the AI-powered code analysis service "Xint Code," has announced that it has discovered a vulnerability called "Copy Fail" in the encryption-related functions of the Linux kernel that allows for local privilege escalation, enabling a regular user to gain root privileges.

A critical vulnerability of the "zero day" type has been made public in the Linux kernel, which allows any unprivileged local user to gain full root access in virtually all major Linux distributions launched since 2017.tags: linux, zero day, exploit, vulnerability» original news (cyberpress.org)

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 67% of the sources are Center
67% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

copy.fail broke the news on Wednesday, April 29, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal