BACK_TO_FEEDAICRIER_2
Copy Fail exposes Linux root flaw
OPEN_SOURCE ↗
HN · HACKER_NEWS// 3h agoSECURITY INCIDENT

Copy Fail exposes Linux root flaw

Copy Fail is the public disclosure of CVE-2026-31431, a Linux local privilege-escalation bug that the authors say can turn an unprivileged user into root across mainstream distributions. The site ships a 732-byte PoC and a mitigation path, making this both an exploit release and a patch-now warning for shared kernels.

// ANALYSIS

This is the kind of kernel bug that stops being “just” a CVE the moment it lands in container hosts, CI runners, and multi-tenant dev boxes. The exploit narrative is unusually stark: tiny payload, broad distro reach, and a claimed no-race, no-offset path from user to root.

  • Shared infra takes the hardest hit: Kubernetes nodes, self-hosted runners, and shell platforms are the obvious blast radius.
  • The public PoC makes validation easy for defenders, but it also lowers the bar for abuse on unpatched systems.
  • The mitigation is straightforward in principle: patch kernels that include the fix, then disable `algif_aead` or block `AF_ALG` where you cannot patch immediately.
  • For AI teams, the practical risk is any place they run untrusted code, model evals, sandboxes, or agent workloads on shared Linux kernels.
  • The disclosure reads like a reminder that old kernel APIs can become high-severity attack surface long after everyone stopped looking at them.
// TAGS
copy-failinfrastructurecloudself-hosted

DISCOVERED

3h ago

2026-04-29

PUBLISHED

5h ago

2026-04-29

RELEVANCE

7/ 10

AUTHOR

unsnap_biceps