Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Linux Flaw ‘Copy Fail’ Allows Root Access

Critical Linux Flaw ‘Copy Fail’ Allows Root Access

Posted on April 30, 2026 By CWS

Cybersecurity experts have uncovered a critical vulnerability in the Linux operating system, which could potentially allow local users without privileges to gain root access. This high-severity flaw, identified as CVE-2026-31431 and codenamed ‘Copy Fail,’ carries a CVSS score of 7.8, highlighting its significant impact. The discovery was made by research teams from Xint.io and Theori.

Understanding the Copy Fail Vulnerability

The core issue with the ‘Copy Fail’ vulnerability lies in a logic flaw within the cryptographic subsystem of the Linux kernel, specifically in the algif_aead module. This problem originated from a source code commit dating back to August 2017. The vulnerability allows an unprivileged local user to write four controlled bytes into the page cache of any readable file, potentially leading to root access.

Exploiting this flaw is possible with a concise 732-byte Python script. The script modifies a setuid binary, granting root access across nearly all Linux distributions released since 2017, including popular versions like Amazon Linux, RHEL, SUSE, and Ubuntu. The exploit involves a four-step process: opening an AF_ALG socket, constructing a shellcode payload, triggering a write operation to the kernel’s cached copy of a critical file, and executing that file as root.

Impact and Response from Linux Distributions

While the ‘Copy Fail’ vulnerability does not allow remote exploitation on its own, it provides a local user with the ability to corrupt the page cache of a setuid binary, thus gaining root privileges. The vulnerability also poses cross-container risks, as the page cache is shared across all processes on a system. In response, Linux distributions have issued advisories to address this security threat.

The vulnerability bears similarities to the Dirty Pipe vulnerability (CVE-2022-0847), which also enabled unprivileged users to manipulate the page cache of files. However, ‘Copy Fail’ is distinct in its subsystem, as noted by Bugcrowd’s David Brumley. The 2017 optimization in the algif_aead module allowed a page-cache page to be writable, facilitating the exploit across various Linux distributions.

Unique Threat Posed by Copy Fail

The danger of the ‘Copy Fail’ vulnerability lies in its ability to be reliably triggered without requiring race conditions or specific kernel offsets. It is notable for its portability, small size, stealth, and cross-container functionality. According to Xint.io, these characteristics make it a rare and potent threat, capable of elevating any user account to full administrative access and bypassing sandboxing measures across all Linux versions.

This vulnerability underscores the ongoing need for vigilance in cybersecurity and the importance of promptly addressing security flaws to protect systems against potential exploits. Users and administrators are urged to follow the advisories issued by Linux distributions to mitigate the risks associated with ‘Copy Fail.’

The Hacker News Tags:algif_aead, Copy Fail, CVE-2026-31431, Cybersecurity, Dirty Pipe, Exploit, Kernel, Linux, privilege escalation, root access, Security, Theori, Vulnerability, Xint.io

Post navigation

Previous Post: CVE MCP Server Transforms Claude Into Security Analyst
Next Post: Linux Kernel Vulnerability Exposes Systems to Attacks

Related Posts

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors The Hacker News
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach The Hacker News
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day The Hacker News
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows The Hacker News
Enhancing Security with Ceros for Claude Code Enhancing Security with Ceros for Claude Code The Hacker News
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical cPanel Vulnerability Exploited for Months
  • Hackers Exploit Qinglong RCE Vulnerabilities
  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical cPanel Vulnerability Exploited for Months
  • Hackers Exploit Qinglong RCE Vulnerabilities
  • Linux Kernel Vulnerability Exposes Systems to Attacks
  • Critical Linux Flaw ‘Copy Fail’ Allows Root Access
  • CVE MCP Server Transforms Claude Into Security Analyst

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark