Back

Critical Linux Kernel Vulnerability 'Copy Fail' Exposes Major Distributions to Root Access

Severity: High (Score: 72.9)

Sources: Cybersecuritynews, Itnews.Au, News.Ycombinator

Summary

A critical zero-day vulnerability, tracked as CVE-2026-31431 and named 'Copy Fail', was disclosed on April 22, 2026. This flaw allows any unprivileged local user to gain root access on nearly all major Linux distributions released since 2017. The vulnerability exploits the kernel crypto API (AF_ALG), which is enabled by default in most mainstream distributions. Affected systems include Debian, Arch, Fedora, Rocky, Alma, and Oracle. The first public proof of concept (PoC) was released on April 30, 2026, highlighting the urgent need for patching. This vulnerability poses a significant risk, particularly for shared environments like development servers and CI/CD pipelines. Users are advised to prioritize patching to mitigate potential exploitation. The vulnerability does not grant remote access but allows local code execution to escalate privileges. Key Points: • CVE-2026-31431, known as 'Copy Fail', affects all major Linux distributions since 2017. • The vulnerability allows unprivileged local users to gain root access without network access. • Immediate patching is recommended for shared environments to prevent privilege escalation.

Key Entities

  • Zero-day Exploit (attack_type)
  • CVE-2026-31431 (cve)
  • CWE-269 - Improper Privilege Management (cwe)
  • Cwe-787 - Out-of-bounds Write (cwe)
  • Alma (platform)
  • Arch (platform)
  • Kubernetes (platform)
  • Linux (platform)
  • Linux kernel (platform)
  • Debian (company)
  • Fedora (company)
  • Oracle (company)
  • GitHub Actions (tool)
  • Copy Fail (vulnerability)
  • Dirty Cow (vulnerability)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed