The most impactful vulnerabilities are not always flashy zero-days. Often, they are quiet, reliable local privilege escalations (LPEs) that persist for years, unnoticed. CVE-2026-31431, dubbed "Copy Fail," is precisely this type of **Linux flaw**.
CISA added Copy Fail to its Known Exploited Vulnerabilities (KEV) catalog on May 3, 2026, confirming active exploitation, with preliminary testing activity observed by Microsoft Defender Security Research Team. This vulnerability has existed in the Linux kernel since 2017, with its foundational changes dating back to 2011. This nine-year dormancy for such a critical flaw is notable.
How a 4-byte overwrite gets you root
The core of Copy Fail is a logic bug in the Linux kernel's authentication cryptographic template. Researchers from Theori and Xint describe it as a logic flaw involving incorrect resource transfer between kernel components. What that means in practice is a controlled, 4-byte overwrite in the kernel's in-memory page cache.
Unlike complex memory corruption exploits involving race conditions or memory address guessing, this is a precise, controlled overwrite. The exploit leverages legitimate system calls, which interact with the Linux kernel's authentication cryptographic template. The flaw was introduced through three separate changes to the Linux kernel in 2011, 2015, and 2017.
The attack unfolds in a few key steps:
- An unprivileged local user prepares a very small Python script.
- This script triggers the kernel bug, causing a controlled 4-byte overwrite in the page cache of any readable file.
- The target? Typically, a setuid binary like
/usr/bin/su. - When that
subinary is executed, the kernel serves up the corrupted page from its cache, effectively injecting attacker-controlled code. - The attacker's process then escalates to UID 0, giving them full root privileges.
The exploit's simplicity and stealth are its defining characteristics. The original Python-based exploit, for instance, is a mere 732 bytes. It operates entirely in memory, avoiding disk writes. This means traditional file integrity monitoring systems often fail to detect it, requiring deep kernel-level visibility for detection.
The Discovery of Copy Fail: A Persistent Linux Flaw
Copy Fail represents more than just another LPE. While human researchers have historically uncovered flaws like Dirty Cow (CVE-2016-5195) or Dirty Pipe (CVE-2022-0847), Copy Fail distinguishes itself through its reliability, stealth, and lack of reliance on complex timing or memory manipulation. Unlike Dirty Cow, which involved a race condition in the memory subsystem, or Dirty Pipe, which exploited a pipe buffer issue, Copy Fail stems from a fundamental logic bug in the authentication cryptographic template. This makes it exceptionally stable and difficult to patch without deep understanding, as it doesn't rely on transient memory states. Its root cause as a logic bug in the authentication cryptographic template, rather than a complex memory corruption, makes it exceptionally stable and difficult to patch without deep understanding. This 'boringly practical' nature is precisely what allowed this **Copy Fail Linux flaw** to persist for nearly a decade, evading detection and highlighting a systemic challenge in auditing critical, low-level system components.
Why This Hits Hard in Cloud and Containers
While Copy Fail is an LPE, its impact on cloud-native and containerized environments is substantial. If the algif_aead module is loaded by default in the host kernel—a potentially common configuration—this LPE provides a direct vector for container breakout. The algif_aead module, part of the Linux kernel's cryptographic API, is often enabled by default in many distributions and cloud environments to support various cryptographic operations, making it a widespread attack surface. Its presence means that the vulnerable code path is readily accessible to an attacker within a container.
Consider an attacker gaining initial access to a low-privilege container, perhaps via a misconfigured web application or a malicious CI/CD pipeline. Executing the Copy Fail exploit then allows them to escape the container and achieve root access on the underlying host. This moves beyond a compromised container to full control over the physical machine, affecting all other containers and tenants on that host. This scenario is particularly alarming in multi-tenant cloud environments, where a single container compromise could lead to a full-scale breach of the underlying infrastructure, impacting numerous customers.
This directly challenges the perceived isolation and security assurances of modern cloud architectures. While containers segment workloads, a reliable LPE like Copy Fail can bypass these boundaries.
What We Do Now
Patching your systems is the immediate priority. Linux kernel versions 6.18.22, 6.19.12, and 7.0 contain the fixes. For federal agencies, CISA's May 15, 2026 deadline is a firm deadline. For everyone else, consider it a top priority.
Where immediate patching is not feasible, consider alternative mitigations such as disabling the affected feature, implementing strict network isolation, and applying granular access controls. However, these are temporary measures.
This discovery forces us to adapt to a new operational reality. The uncovering of deep, long-standing kernel flaws like Copy Fail highlights the need for continuous vigilance. Our patching cycles, auditing processes, and incident response playbooks must adapt to the reality that such vulnerabilities can persist for years. We can no longer rely solely on traditional human-led security audits for critical components like the Linux kernel. We must integrate advanced tooling such as eBPF-based security solutions for deep kernel visibility, kernel integrity monitoring, and proactive threat hunting to detect anomalous behavior that might indicate exploitation of such stealthy vulnerabilities. Operating under the assumption that even the most established infrastructure components may harbor decades-old vulnerabilities is now paramount. Integrating these new realities rapidly into our defense strategies is critical for maintaining the effectiveness of Linux security.