Skip to main content
See every side of every news story
Published loading...Updated

Severe Linux Copy Fail security flaw uncovered using AI scanning help

The exploit works across vulnerable distributions with no modification, and researchers said many distros had not yet shipped fixes when details were published.

  • On Wednesday, security firm Theori publicly disclosed CVE-2026-31431, a severe local privilege escalation vulnerability known as CopyFail that allows unprivileged users to gain administrator privileges across virtually all Linux distributions released since 2017.
  • The vulnerability stems from a logic flaw in the Linux kernel's crypto API, where the AEAD template process fails to copy data correctly; the same Python script therefore works reliably across distributions without modification.
  • DevOps engineer Jorijn Schrijvershof noted the flaw is "unusually nasty" because page-cache corruption never marks pages dirty, allowing the exploit to bypass monitoring tools like AIDE and OSSEC and compromise Kubernetes nodes.
  • Although a patch for CopyFail was added to the mainline Linux kernel on April 1st, few distributions had incorporated the fixes when Theori released the exploit code five weeks after private disclosure.
  • Security experts consider CopyFail the "worst make-me-root vulnerabilities in the kernel in recent times," comparing its severity to historical bugs like Dirty Pipe from 2022 and Dirty Cow from 2016.
Insights by Ground AI

12 Articles

Lean Right

There is a new follow-up failure on Linux that is worrying the security anliasts and secialists. This copy failure vulnerability (CVE-2026-31431) has been discovered in the Linux kernel and allows you to...

·Portugal
Read Full Article

Imagine a Python script so short that it fits in a tweet and that, executed on almost any Linux machine, gives you the keys to the kingdom. That’s CopyFail, the vulnerability that has been hidden in the kernel for nine years and that this week has put half the Internet to apply patches to counterclockwise. The bug is officially called CVE-2026-31431, but someone in Mastodon baptized it as CopyFail and the name stayed. It affects the practical to…

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 67% of the sources lean Left
67% Left

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

slashdot.org broke the news on Thursday, April 30, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal