Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

‘Copy Fail’ Logic Flaw in Linux Kernel Enables System Takeover

0
Medium
Vulnerabilitylinux
Published: Thu Apr 30 2026 (04/30/2026, 10:06:00 UTC)
Source: SecurityWeek

Description

CVE-2026-31431, known as 'Copy Fail,' is a logic flaw in the Linux kernel's authencesn cryptographic template introduced in 2017. It allows local attackers with code execution privileges to write arbitrary code into the in-memory page cache of other files, including setuid-root binaries, enabling privilege escalation to root. The vulnerability affects all Linux distributions since 2017 and poses a significant risk in multi-tenant and containerized environments where shared kernel memory is used. Exploitation does not modify files on disk but alters their in-memory cached copies, making detection harder. The flaw stems from an optimization that placed page cache pages in a writable scatterlist, allowing out-of-bounds writes during byte rearrangement. Patches have been released that revert this optimization to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/30/2026, 10:06:32 UTC

Technical Analysis

The 'Copy Fail' vulnerability (CVE-2026-31431) is a high-severity logic bug in the Linux kernel's authencesn AEAD template used by IPsec for Extended Sequence Number support. Introduced in 2017, it affects all Linux distributions by placing page cache pages in a writable scatterlist and using the caller's destination scatterlist as scratch space. During cryptographic operations, a write of four bytes occurs past the AEAD tag boundary into the cached copy of another file. This allows an attacker with local code execution to modify the in-memory page cache of any setuid-root binary readable by the user, resulting in root shell access. The vulnerability differs from Dirty Pipe and Dirty Cow by modifying memory without altering the file on disk. Exploitation is achievable with a small Python script. The vendor patches remove the problematic optimization, reverting to out-of-place operations and unlinking page cache pages from writable scatterlists.

Potential Impact

Successful exploitation allows local attackers to escalate privileges to root by modifying in-memory cached copies of setuid-root binaries without changing files on disk. This leads to full system takeover, especially in environments with shared kernels such as multi-tenant Linux hosts, containers, and CI runners. The vulnerability undermines kernel memory isolation and can result in node and cross-tenant compromises. No known exploits in the wild have been reported at the time of disclosure.

Mitigation Recommendations

Fixed versions of the Linux kernel have been released that remove the 2017 optimization responsible for the vulnerability by reverting to out-of-place operations and unlinking page cache pages from writable scatterlists. Organizations should update their Linux distributions to these patched versions as soon as possible, particularly in multi-tenant, containerized, or CI environments running untrusted code. Since this is a kernel-level flaw, applying the official kernel patches is the primary mitigation. Patch status is confirmed by vendor advisories and security researchers. No alternative mitigations or workarounds are indicated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/copy-fail-logic-flaw-in-linux-kernel-enables-system-takeover/","fetched":true,"fetchedAt":"2026-04-30T10:06:21.901Z","wordCount":992}

Threat ID: 69f3299dcbff5d8610c1c55e

Added to database: 4/30/2026, 10:06:21 AM

Last enriched: 4/30/2026, 10:06:32 AM

Last updated: 4/30/2026, 12:31:37 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses