Linux Kernel Zero Day Copy Fail Lets Attackers Gain Root Access on Major Distributions

The flaw was introduced through three separate kernel changes made in 2011, 2015, and 2017, none of which appeared malicious individually.

CSBadmin
2 Min Read

Vulnerability Overview

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel zero day vulnerability, tracked as CVE-2026-31431 and nicknamed “Copy Fail,” to its Known Exploited Vulnerabilities catalog. This flaw carries a CVSS score of 7.8 and stems from a logic bug in the algif_aead module within the AF_ALG cryptographic subsystem. The vulnerability causes improper memory handling during in place operations, allowing an unprivileged local user to escalate privileges to root using a simple 732 byte Python script.

Impact and Scope

This flaw affects every major Linux distribution running kernels built since 2017, including Ubuntu 24.04 LTS, Amazon Linux 2023, Red Hat Enterprise Linux 10.1, SUSE 16, Debian, Fedora, and Arch Linux. The attack chain exploits the interaction between the AF_ALG socket interface, the splice() system call, and improper error handling during a failed copy operation. This results in a controlled 4 byte overwrite in the kernel page cache, allowing attackers to corrupt setuid binaries and other sensitive data entirely within kernel space.

Mitigation and Response

CISA added this vulnerability to its KEV catalog on May 1, 2026, with a mandatory remediation deadline of May 15, 2026, for all federal civilian agencies. Patches are available in Linux kernel versions 6.18.22, 6.19.12, and 7.0. Organizations running Red Hat Enterprise Linux can apply configuration level mitigations. Security teams are urged to audit Linux kernel versions across cloud workloads, container environments, and on premises infrastructure without delay, as active exploitation in the wild has been confirmed.

Source: Cybersecuritynews

CSBadmin

The latest in cybersecurity news and updates.

TAGGED:
Share This Article
Follow:
The latest in cybersecurity news and updates.