OPEN_SOURCE ↗
HN · HACKER_NEWS// 3h agoSECURITY INCIDENT
Copy Fail exposes Linux root flaw
Copy Fail is the public disclosure of CVE-2026-31431, a Linux local privilege-escalation bug that the authors say can turn an unprivileged user into root across mainstream distributions. The site ships a 732-byte PoC and a mitigation path, making this both an exploit release and a patch-now warning for shared kernels.
// ANALYSIS
This is the kind of kernel bug that stops being “just” a CVE the moment it lands in container hosts, CI runners, and multi-tenant dev boxes. The exploit narrative is unusually stark: tiny payload, broad distro reach, and a claimed no-race, no-offset path from user to root.
- –Shared infra takes the hardest hit: Kubernetes nodes, self-hosted runners, and shell platforms are the obvious blast radius.
- –The public PoC makes validation easy for defenders, but it also lowers the bar for abuse on unpatched systems.
- –The mitigation is straightforward in principle: patch kernels that include the fix, then disable `algif_aead` or block `AF_ALG` where you cannot patch immediately.
- –For AI teams, the practical risk is any place they run untrusted code, model evals, sandboxes, or agent workloads on shared Linux kernels.
- –The disclosure reads like a reminder that old kernel APIs can become high-severity attack surface long after everyone stopped looking at them.
// TAGS
copy-failinfrastructurecloudself-hosted
DISCOVERED
3h ago
2026-04-29
PUBLISHED
5h ago
2026-04-29
RELEVANCE
7/ 10
AUTHOR
unsnap_biceps