Copy Fail’ Flaw in Linux Enables Root Access; Patches Urged Across Distributions

Critical ‘Copy Fail’ Vulnerability Exposes Linux Systems to Root Exploits

A significant security flaw, known as Copy Fail and officially designated as CVE-2026-31431, has been identified in the Linux kernel, affecting versions released since 2017. This vulnerability enables unprivileged local users to escalate their privileges to root access, posing a substantial risk to a wide range of Linux distributions, including Ubuntu, Red Hat Enterprise Linux (RHEL), SUSE, Amazon Linux, Debian, Fedora, and Arch Linux.

Technical Details:

The Copy Fail vulnerability originates from a logic error in the Linux kernel’s `authencesn` cryptographic template, which is part of the `algif_aead` module within the AF_ALG cryptographic subsystem. This flaw allows an unprivileged user to perform a controlled 4-byte write into the page cache of any readable file on the system. By targeting setuid-root binaries, attackers can manipulate this write operation to execute arbitrary code with root privileges. The exploit leverages the AF_ALG socket interface in conjunction with the `splice()` system call, facilitating a reliable attack without the need for race conditions or system-specific adjustments.

Discovery and Disclosure:

Security researchers at Theori, utilizing their AI-powered penetration testing tool Xint Code, discovered this vulnerability. They reported it to the Linux kernel security team on March 23, 2026. Within a week, patches were developed and released to address the issue. The proof-of-concept exploit, consisting of a mere 732 bytes of Python code, has been demonstrated to work consistently across various Linux distributions without modification.

Impact on Containerized Environments:

The Copy Fail vulnerability is particularly concerning for containerized environments. Since the page cache is shared among all processes on a host, including across container boundaries, a compromised container can corrupt setuid binaries visible to other containers and the host kernel. This means that an attacker who gains access to a single container could potentially escalate privileges across the entire system, affecting all other containers and the host itself.

Government Advisory and Mitigation:

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has acknowledged the severity of this vulnerability by adding it to its Known Exploited Vulnerabilities (KEV) catalog on May 1, 2026. CISA has set a remediation deadline of May 15, 2026, for all federal civilian agencies, urging immediate action to patch affected systems. Patches are available in Linux kernel versions 6.18.22, 6.19.12, and 7.0. Organizations using Red Hat Enterprise Linux can apply configuration-level mitigations while deploying the patches.

Recommendations:

Given the critical nature of the Copy Fail vulnerability and its active exploitation in the wild, it is imperative for all organizations running affected Linux distributions to:

– Apply Patches Promptly: Update to the latest kernel versions that include the security patches addressing CVE-2026-31431.

– Audit Systems: Conduct thorough audits of Linux kernel versions across all cloud workloads, container environments, and on-premises infrastructure to identify and remediate vulnerable systems.

– Implement Mitigations: For systems where immediate patching is not feasible, apply available configuration-level mitigations to reduce the risk of exploitation.

By taking these steps, organizations can protect their systems from potential attacks exploiting the Copy Fail vulnerability.