Forgot your password?
typodupeerror
Security Bug Privacy Linux

New Linux 'Copy Fail' Vulnerability Enables Root Access On Major Distros (copy.fail) 127

A newly disclosed Linux kernel flaw dubbed "Copy Fail" can let a local, unprivileged attacker gain root access on major Linux distributions, with researchers claiming the bug affects kernels shipped since 2017. "The POC exploit works out of the box today, but a future version that can escape from containers like Docker is promised soon," writes Slashdot reader tylerni7. "Technical details are available here." Slashdot reader BrianFagioli shares a report from NERDS.xyz: A newly disclosed Linux kernel vulnerability called Copy Fail (CVE-2026-31431) allows an unprivileged user to gain root access using a tiny 732-byte script, and it works with unsettling consistency across major distributions. Unlike older exploits that relied on race conditions or fragile timing, this one is a straight-line logic flaw in the kernel's crypto subsystem. It abuses AF_ALG sockets and splice to overwrite a few bytes in the page cache of a target file, such as /usr/bin/su. Because the kernel executes from the page cache, not directly from disk, the attacker can inject code into a setuid binary in memory and immediately escalate privileges.

What makes this especially concerning is how quiet it is. The file on disk remains unchanged, so standard integrity checks see nothing wrong, while the in-memory version has already been tampered with. The same primitive can also cross container boundaries since the page cache is shared, raising the stakes for multi-tenant environments and Kubernetes nodes. The underlying issue traces back to an in-place optimization added years ago, now being rolled back as part of the fix. Until patched kernels are widely deployed, this is one of those bugs that feels less like a theoretical risk and more like a practical, reliable path to full system compromise.

New Linux 'Copy Fail' Vulnerability Enables Root Access On Major Distros

Comments Filter:
  • by Narcocide ( 102829 ) on Thursday April 30, 2026 @07:06PM (#66121270) Homepage

    Blacklist kernel module "algif_aead" ...you probably weren't using it anyway.

    • With RHEL variants, that module cannot be blocklisted as itâ(TM)s a builtin. So claims their website. I havenâ(TM)t tried it yet.
      • I tried a couple of my systems: RockyLinux9, RHEL9, Fedora 31 and Fedora 39 -- vulnerable with no mitigation:

        rmmod algif_aead rmmod: ERROR: Module
        algif_aead is builtin.

        Old CentOS7 server that was never upgraded and old Rasbian/Debian Jessie based systems -- not vulnerable.

        Let the fun begin! This one seems serious as I can see a lot of RHEL servers going unpatched for a long time.

        • by Junta ( 36770 )

          $ cat /proc/cmdline ... initcall_blacklist=algif_aead_init

          That's what RHEL is going to need until a kernel is patched...

          Which will probably be pretty soon.. but anyway...

      • On my Debian stable:

        rmmod: ERROR: Module algif_aead is not currently loaded

        Does it means I'm not affected?

        Debian's web site say it's fixed in a newer kernel release:
        https://security-tracker.debia... [debian.org]

      • by Junta ( 36770 )

        $ cat /proc/cmdline ... initcall_blacklist=algif_aead_init

        That will do it for builtin

  • Configurable? (Score:3, Insightful)

    by Tablizer ( 95088 ) on Thursday April 30, 2026 @07:07PM (#66121274) Journal

    The underlying issue traces back to an in-place optimization added years ago, now being rolled back as part of the fix.

    Could they have made that feature a configuration switch instead of hardwiring it in? That way it could be quickly undone if it proved a problem. Or would the branching time to check the switch defeat the purpose of optimization?

    • by Junta ( 36770 )

      It is configurable, e.g.:
      initcall_blacklist=algif_aead_init"

      Now if you meant without a reboot, well in which case that universe is way too open ended. *anything* could be a security mistake so you'd need to have each function in the kernel somehow being capable of being disabled...

  • by 93 Escort Wagon ( 326346 ) on Thursday April 30, 2026 @07:21PM (#66121292)

    Not that I don't trust our students*, but - yeah I see lots of patching in my future...

    *Even without bad intentions, these are engineering students and have been known to try stupid stuff before

  • Asleep at the wheel (Score:4, Informative)

    by cen1 ( 2915315 ) on Thursday April 30, 2026 @07:35PM (#66121314)
    So apparently this also allows a container escape and thus the whole k8s cluster is at risk and vulnerable. EKS, GKE all vulnerable.. companies who earn billions from cloud have no fix day 1, yet a community distro of greybeards managed to patch Debian within 24 hours. Coincidentally, RHEL is still not patched while Ubuntu websites are not available due to an apparent massive DDoS For 8h+ now (which can't be a coincidence, someone trying to prevent update rollouts?). What a word to live in.
    • Thanks for not calling us neckbeards. :)

    • by AmiMoJo ( 196126 )

      So whose fault is it? Did the people who discovered the vulnerability not give vendors reasonable time to patch it before going public, or are those vendors just very slow to deploy a patched kernel?

      If Debian had to patch it in 24 hours it sounds like there was not adequate time between disclosure and going public.

    • by kriston ( 7886 )

      The Ubuntu repositories don't appear to be affected, just the ubuntu.com web site.

      I patched my Ubuntu systems yesterday.

    • by tlhIngan ( 30335 )

      So apparently this also allows a container escape and thus the whole k8s cluster is at risk and vulnerable. EKS, GKE all vulnerable.. companies who earn billions from cloud have no fix day 1, yet a community distro of greybeards managed to patch Debian within 24 hours. Coincidentally, RHEL is still not patched while Ubuntu websites are not available due to an apparent massive DDoS For 8h+ now (which can't be a coincidence, someone trying to prevent update rollouts?). What a word to live in.

      It's a privilege

  • ...  for  office multi-user systems.  For  PCs of single home users -- who would run WinME rather than a multi-user environment -- and nominally insure their  Linux system  with  Dan Wesson not-so-much.  They are very very different worlds.
  • by markdavis ( 642305 ) on Thursday April 30, 2026 @08:22PM (#66121384)

    For older enterprise distros, this mitigation method:

    # echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
    # rmmod algif_aead

    Does not work because algif_aead is built into the kernels.

    However, this does work:
    # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

    Then reboot. It will disable the vulnerable module that is built-in. I am not sure if there are any negative ramifications of having algif_aead disabled, though. Does anyone know?

    Updating to a patched kernel is, of course, the better course.

    See https://seclists.org/oss-sec/2... [seclists.org]

    • >"I am not sure if there are any negative ramifications of having algif_aead disabled, though. Does anyone know?"

      According to my research, it isn't used on most systems.

      "Disabling algif_aead typically does not break anything, as most programs use userspace libraries instead of relying on this kernel module. It is noted that only a few specific applications, like iwd and cryptsetup with certain non-default algorithms, may be affected."

    • I am not sure if there are any negative ramifications of having algif_aead disabled, though. Does anyone know?

      https://copy.fail/#mitigation [copy.fail]

      • Will not affect: dm-crypt / LUKS, kTLS, IPsec/XFRM, in-kernel TLS, OpenSSL/GnuTLS/NSS default builds, SSH, kernel keyring crypto. These all use the in-kernel crypto API directly — they don't go through AF_ALG.
      • May affect: userspace specifically configured to use AF_ALG — e.g. OpenSSL with the afalg engine explicitly enabled, some embedded crypto offload paths, or applications that bind aead/skcipher/hash sockets directly. Check with lsof | grep AF_ALG or ss -xa if in doubt.
      • Performance: AF_ALG is a userspace front door to the kernel crypto API. Disabling it does not slow anything that wasn't already calling it; for the things that were, performance falls back to a normal userspace crypto library, which is what almost everything else already does.
  • Discovered With AI (Score:5, Interesting)

    by snookiex ( 1814614 ) on Thursday April 30, 2026 @08:56PM (#66121432) Homepage
    According to the exploit page [copy.fail], it was discovered by an AI-powered product from Xint Code (the ones who supposedly created the exploit). This means several others are rapidly catching up with Mythos (as was to be expected). This could be very good (if software vendors quickly patch their products and make it through the initial wave of reports) or very bad if the deployed systems are not updated (which is the most likely scenario). In any case, I prefer to bite the bullet once and for all and face the tsunami instead of dealing with the uncertainty manipulated by a few tech bros. Either way, this is not going to be nice.
    • I think in general we are approaching a world of "very bad" when it comes to AI discovered exploits working well. Basic economics dictate that if we need resources to address problems then a significant portion of them will remain unfixed. This means we have more known exploits out there.

      Ultimately since no one should be stupid enough to allow AI to fix production code, or patch production systems, the winners here will be the ones using AI to find new ways to exploit systems.

  • by fahrbot-bot ( 874524 ) on Thursday April 30, 2026 @09:23PM (#66121466)

    A way to become root on my single-user home Linux Mint system w/o having to use sudo. :-)

  • That was fast (Score:2, Insightful)

    by Pezbian ( 1641885 )

    Microsoft would have buried this kind of thing.
    Apple, too.

    Already fixed here. That was easy.

    • Microsoft has a history of releasing out of band patches for serious vulnerability such as this, especially when the bugs are discovered by external parties. Reality does not agree with you.

  • Surprised that a certain vigorous champion of Linux and MacOS hasn't been here yet to boast that this is far less serious than any and all faults in Windows.

    Of course there could be downvoted comments lurking below my threshold but I'm not going to unlock it just to see.

    • by Slayer ( 6656 )

      Whoever is meant by your comment could rightfully argue, that a local exploit like this one is completely shadowed by Microsoft's OWA and their Sharepoint exploits, which ravaged the whole industry only few years ago. And that person would be 100% correct with that statement.

      You may begin to have a point, if we see Slashdot articles with 80+ comments about local Windows privilege escalation exploits.

  • Fixed kernels (Score:4, Informative)

    by Zarhan ( 415465 ) on Friday May 01, 2026 @02:30AM (#66121726)

    This info seems to be relatively hidden to get as summarized form, but since I'm running Gentoo I actually wanted to know what kernel versions are affected...Anyway, here goes. Look for commit 3d14bd48e3a.

    First appeared in 4.14.

    Fixed in:
            7.0+
            6.19.12
            6.18.22
            6.12.85
            6.6.137
            6.1.170
            5.15.204
            5.10.254

    • Thank you.

      While I am up to 6.18 on my desktop, it's only 6.18.18, so it will need another update. The others, (laptop and media server), will need a jump to a new kernel series. They are all older kernels.

      Also use Gentoo. Everytime I think it's too much work to trouble shoot a problem, I figure it out and make the updates better. Now Gentoo updates run pretty much problem free. Even when they do go south, I use ABEs, making recovery brain dead simple: Boot the prior OS. (ABE = Alternate Boot Environment
  • The widely-published script does, indeed, work if you hadn't patched within the past two weeks or so.

    Security agents also work by detecting and killing the spawned process on platforms that aren't patched.

    • by Junta ( 36770 )

      Or if running a rhel or derivative without initcall_blacklist=algif_aead_init, then you are *still* vulnerable even if you had patched just now.

The perversity of nature is nowhere better demonstrated by the fact that, when exposed to the same atmosphere, bread becomes hard while crackers become soft.

Working...