CISA flags actively exploited ‘Copy Fail’ Linux kernel flaw enabling root takeover across major distros — unpatched systems may remain vulnerable to attack

Linux penguins
(Image credit: Getty Images)

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a newly disclosed Linux vulnerability, dubbed “Copy Fail,” to its Known Exploited Vulnerabilities catalog on May 1st, warning that the flaw, tracked as CVE-2026-31431, is already being used in active attacks and urging rapid patching across affected systems.

Security researchers at Theori disclosed the flaw publicly last week, releasing a working proof-of-concept exploit alongside their findings. According to the team, the exploit is “100% reliable” and functions without modification across multiple major Linux distributions, including Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, and SUSE 16. That level of portability is unusual and lowers the barrier for attackers seeking to weaponize the bug.

Latest Videos From

At a technical level, the bug enables attackers to write controlled data into the kernel‘s page cache, a low-level memory structure, ultimately allowing privilege escalation. While the exploit requires local access, it still allows attackers to break out of standard user restrictions and gain full control of the system.

Compounding the risk, a discussion on the Openwall oss-security mailing list suggests that the vulnerability and the working exploit were publicly disclosed without prior coordination with Linux distribution maintainers. In typical responsible disclosure processes, vendors are given advance notice to prepare and distribute patches before technical details are made public.

In this case, however, maintainers indicated that no such heads-up was provided, leaving some distributions without fixes ready at the time of disclosure. One contributor noted that older long-term support kernel branches had yet to receive backported patches, forcing developers to rely on temporary mitigations, including disabling affected cryptographic modules.

The result is a compressed response window in which defenders must scramble to deploy updates while attackers can immediately leverage publicly available exploit code.

That dynamic is reflected in CISA‘s unusually swift inclusion of the flaw in its exploited vulnerabilities list, signaling that the issue poses a significant and immediate risk. CISA has given U.S. federal agencies two weeks to apply patches, in line with Binding Operational Directive 22-01, and has also urged all organizations to prioritize remediation.

Linux vendors have begun rolling out kernel updates to address the flaw. However, with exploit code already in the wild, users running older or unpatched systems may remain vulnerable until the fixes are applied.

Google Preferred Source

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Etiido Uko
News Contributor

Etiido Uko is a news contributor for Tom's Hardware covering the latest updates in big tech and the PC industry. He is a mechanical engineer and senior technical writer with over nine years of experience in documentation and reporting. He is deeply passionate about all things engineering and technology, and is an expert in gadgets, manufacturing, robotics, automotive, and aerospace.

  • PEnns
    Sounds like a Windows update snafu......but Linux-flavored this time.
    Reply
  • Lamarr the Strelok
    They'll keep popping up if Linux gets more popular. Which is good at the end of the day.,all things considered. Linux people hopefully can keep up with the exploits.
    Reply
  • S58_is_the_goat
    2026 is the year of the Linux desktop...
    Reply
  • Lamarr the Strelok
    S58_is_the_goat said:
    2026 is the year of the Linux desktop...
    I've been using Linux desktop for 6 years and it's glorious. Single player games and most other stuff runs better than on windows. I don't do nearly as much office type stuff as many here, so I'm lucky there but it's truly nice using Mint or other distros instead of windows.
    Reply
  • xiq
    S58_is_the_goat said:
    2026 is the year of the Linux desktop...
    none of this matters to the linux desktop user, my reaction to the news was "damn that's bad, good thing they found it" it's not like most users have multiple people accessing their device through ssh or whatever else method.
    Reply
  • bit_user
    Lamarr the Strelok said:
    Linux people hopefully can keep up with the exploits.
    It's not an issue of them keeping up with the exploits. They can normally handle the volume just fine.

    The article points out that the researchers who discovered it released a working version of the exploit, before informing vendors. That's unethical and goes against long-standing practice.
    Reply
  • Lamarr the Strelok
    bit_user said:
    It's not an issue of them keeping up with the exploits. They can normally handle the volume just fine.

    The article points out that the researchers who discovered it released a working version of the exploit, before informing vendors. That's unethical and goes against long-standing practice.
    Oh ok. Yes that's not right. Regardless of the OS that's just scummy IMO. Thanks for pointing this stuff out,it makes me feel a bit better for some reason.I Wouldn't doubt some people just want to be jerks, so they do it.

    I just hope all the Linux devs are ready.Maybe the surge is done. LOL. If Steambox gets released it may boost Linux some more. We never know.
    Reply
  • Lamarr the Strelok
    xiq said:
    none of this matters to the linux desktop user, my reaction to the news was "damn that's bad, good thing they found it" it's not like most users have multiple people accessing their device through ssh or whatever else method.
    I only use desktops and this is news I want to be aware of. I wonder about linux security sometimes since more people are using it now. But the simple requirement to sign in 75% of the time for updates is a lot of effective security. (I hope)
    Reply
  • jp7189
    One of the challenges I have with Linux is its use in so many things. Desktops and servers are under scrutiny and (hopefully) well maintained, but what about your PAC system, or copy room controller.. the iot or scada type devices..things that cant be updated without fear of breaking the upstream application, but whose manufacturers release patches slow to never.
    Reply
  • bit_user
    jp7189 said:
    One of the challenges I have with Linux is its use in so many things. Desktops and servers are under scrutiny and (hopefully) well maintained, but what about your PAC system, or copy room controller.. the iot or scada type devices..things that cant be updated without fear of breaking the upstream application, but whose manufacturers release patches slow to never.
    How many of those would have things like this crypto driver?

    Lots of IoT-like embedded applications use minimal kernels and userspace, which goes some ways toward limiting exposure.
    Reply