Curated RSS Brief
Severe Linux Copy Fail security flaw uncovered using AI scanning help
Tech Close Tech Posts from this topic will be added to your daily email digest and your homepage feed. Follow Follow See All Tech News Close News Posts from this topic will be added to your daily email digest and your homepage feed. Follow Follow See All News Linux Close Linux Posts from this topic will be added to your daily email digest and your homepage feed. Follow Follow See All Linux Severe Linux Copy Fail security flaw uncovered using AI scanning help Some distributions have already released patches or mitigations for the exploit, including Arch Linux and RedHat Fedora. Some distributions have already released patches or mitigations for the exploit, including Arch Linux and RedHat Fedora. by Stevie Bonifield Close Stevie Bonifield News Writer Posts from this author will be added to your daily email digest and your homepage feed. Follow Follow See All by Stevie Bonifield May 1, 2026, 4:55 PM UTC Link Share Gift Image: Cath Virginia / The Verge, Getty Images Stevie Bonifield Close Stevie Bonifield Posts from this author will be added to your daily email digest and your homepage feed. Follow Follow See All by Stevie Bonifield is a news writer covering all things consumer tech. Stevie started out at Laptop Mag writing news and reviews on hardware, gaming, and AI. Nearly every Linux distribution released since 2017 is currently vulnerable to a security bug called “Copy Fail” that allows any user to give themselves administrator privileges. The exploit, publicly disclosed as CVE-2026-31431 on Wednesday, uses a Python script that works across all of the vulnerable Linux distributions, requiring “no per-distro offsets, no version checks, no recompilation,” according to Theori, the security firm that uncovered it. Ars Technica points out this blog post where DevOps engineer Jorijn Schrijvershof explains that what makes Copy Fail “unusually nasty” is the likelihood for it to go unnoticed by monitoring tools: “Page-cache corruption never marks the page dirty. The kernel’s writeback machinery never flushes the modified bytes back to disk.” As a result, “AIDE, Tripwire, OSSEC and any monitoring tool that compares on-disk checksums see nothing.” Related Attack of the killer script kiddies Anthropic’s ‘Project Mythos’ model found security problems ‘in every major operating system and web browser’ Copy Fail was identified by Theori’s researchers with assistance from their Xint Code AI tool. According to a blog post , Taeyang Lee had an idea of looking into the crypto subsystem of Linux and created this prompt to run an automated scan that identified several vulnerabilities in “about an hour.” “This is the linux crypto/ subsystem. Please examine all codepaths reachable from userspace syscalls. Note one key observation: splice() can deliver page-cache references of read-only files (including setuid binaries) to crypto TX scatterlists.” According to the exploit’s disclosure page, a patch for Copy Fail was added to the mainline Linux kernel on April 1st. However, as Ars Technica notes, the researchers who identified Copy Fail published the details of the exploit publicly before all of the affected distributions could release patches for it. Some distros, including Arch Linux , RedHat Fedora , and Amazon Linux , have released patches, but many others were not immediately able to address the issue. Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates. Stevie Bonifield Close Stevie Bonifield News Writer Posts from this author will be added to your daily email digest and your homepage feed. Follow Follow See All by Stevie Bonifield Linux Close Linux Posts from this topic will be added to your daily email digest and your homepage feed. Follow Follow See All Linux News Close News Posts from this topic will be added to your daily email digest and your homepage feed. Follow Follow See All News Security Close Security Posts from this topic will be added to your daily email digest and your homepage feed. Follow Follow See All Security Tech Close Tech Posts from this topic will be added to your daily email digest and your homepage feed. Follow Follow See All Tech Most Popular Most Popular The craziest part of Musk v. Altman happened while the jury was out of the room The more young people use AI, the more they hate it Microsoft’s Xbox mode is now available for all Windows 11 PCs Meta lost 20 million users last quarter Elon Musk’s worst enemy in court is Elon Musk The Verge Daily A free daily digest of the news that matters most. Email (required) Sign Up By submitting your email, you agree to our Terms and Privacy Notice . This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Advertiser Content From This is the title for the native ad
- Tech Close Tech Posts from this topic will be added to your daily email digest and your homepage feed.
- Follow Follow See All Tech News Close News Posts from this topic will be added to your daily email digest and your homepage feed.
- Follow Follow See All News Linux Close Linux Posts from this topic will be added to your daily email digest and your homepage feed.
- Follow Follow See All Linux Severe Linux Copy Fail security flaw uncovered using AI scanning help Some distributions have already released patches or mitigations for the exploit, including Arch Linux and RedHat Fedora.
If you want the exact wording, examples, or full context from the publisher, open the original source article.
Open Original Article
Comments
Post a Comment