Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions
    Cybersecurity

    New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

    adminBy adminApril 30, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 30, 2026Linux / Vulnerability

    Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.

    The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori.

    “An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root,” the vulnerability research team at Xint.io and Theori said.

    At its core, the vulnerability stems from a logic flaw in the Linux kernel’s cryptographic subsystem, specifically within the algif_aead module. The issue was introduced in a source code commit made in August 2017.

    Successful exploitation of the shortcoming could allow a simple 732-byte Python script to edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017, including Amazon Linux, RHEL, SUSE, and Ubuntu. The Python exploit involves four steps –

    • Open an AF_ALG socket and bind to authencesn(hmac(sha256),cbc(aes))
    • Construct the shellcode payload
    • Trigger the write operation to the kernel’s cached copy of “/usr/bin/su”
    • Call execve(“/usr/bin/su”) to load the injected shellcode and run it as root

    While the vulnerability is not remotely exploitable in isolation, a local unprivileged user can get root simply by corrupting the page cache of a setuid binary. The same primitive also has cross-container impacts as the page cache is shared across all processes on a system.

    In response to the disclosure, Linux distributions have released their own advisories –

    Copy Fail has its echoes in Dirty Pipe (CVE-2022-0847), another Linux kernel LPE vulnerability that could permit unprivileged users to splice data into the page cache of read-only files and ultimately overwrite sensitive files on the system to achieve code execution.

    “Copy Fail is the same class of primitive, in a different subsystem,” Bugcrowd’s David Brumley said. “The 2017 in-place optimization in algif_aead allows a page-cache page to end up in the kernel’s writable destination scatterlist for an AEAD operation submitted over an AF_ALG socket. An unprivileged process can then drive splice() into that socket and complete a small, targeted write into the page cache of a file it doesn’t own.”

    What makes the vulnerability dangerous is that it can be reliably triggered and does not require any race condition or kernel offset. On top of that, the same exploit works across distributions.

    “This vulnerability is unique because it has four properties that almost never appear together: it’s portable, tiny, stealthy, and cross-container,” a Xint.io spokesperson told The Hacker News in a statement. “It allows any user account, no matter how low-level, to increase their privilege to full admin access. It also allows them to bypass sandboxing and works across all Linux versions and distributions.”

    access copy Distributions enables Fail Linux major root vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleDeconstructing the data center: A massive (and massively liberating) project
    Next Article Your AI Visibility Tracker Is Quietly Breaking Your Analytics And Your Strategy
    admin
    • Website

    Related Posts

    Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

    April 30, 2026

    Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities

    April 30, 2026

    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    April 30, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

    April 30, 2026

    Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities

    April 30, 2026

    Your AI Visibility Tracker Is Quietly Breaking Your Analytics And Your Strategy

    April 30, 2026

    New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

    April 30, 2026
    Categories
    • Blogging (71)
    • Cybersecurity (1,597)
    • Privacy & Online Earning (190)
    • SEO & Digital Marketing (984)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (254)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

    April 30, 2026

    Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities

    April 30, 2026

    Your AI Visibility Tracker Is Quietly Breaking Your Analytics And Your Strategy

    April 30, 2026
    Most Popular
    • Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks
    • Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities
    • Your AI Visibility Tracker Is Quietly Breaking Your Analytics And Your Strategy
    • New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions
    • Deconstructing the data center: A massive (and massively liberating) project
    • WPVibe Brings AI to WordPress + Smarter Automations, SEO, & Fundraising Tools
    • Searchers just want you to be helpful
    • Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.