Ipassact

Critical 'Copy Fail' Linux Bug Grants Root Access to Any User – AI-Powered Discovery

Critical Linux privilege escalation bug 'Copy Fail' discovered via AI. Affects distros since 2017. Any user can gain root. Patch now.

Ipassact · 2026-05-02 00:47:34 · Cybersecurity

Urgent: Widespread Linux Vulnerability Allows Privilege Escalation

A severe security flaw dubbed 'Copy Fail' has been publicly disclosed, affecting nearly every Linux distribution released since 2017. The bug, tracked as CVE-2026-31431, allows any local user to gain full administrator (root) privileges with minimal effort.

Critical 'Copy Fail' Linux Bug Grants Root Access to Any User – AI-Powered Discovery
Source: www.theverge.com

The exploit was revealed on Wednesday by Theori, the security firm that uncovered it using advanced AI scanning techniques. Theori demonstrated a single Python script that works across all vulnerable distributions, requiring 'no per-distro offsets, no version checks, no recompilation', according to the company.

The 'Unusually Nasty' Nature of Copy Fail

DevOps engineer Jorijn Schrijvershof described the flaw as 'unusually nasty' because it can easily go undetected by standard monitoring systems. The attack leaves minimal traces, making it a prime tool for stealthy privilege escalation.

The exploit targets a common component in how Linux systems handle file copy operations. Once executed, the Python script manipulates internal memory structures to elevate the attacker's user ID to root.

Background

The vulnerability was discovered by Theori using an artificial intelligence-driven code analysis tool. The AI scanned thousands of lines of open-source kernel and utility code to identify the dangerous bug. Copy Fail is rooted in a copy-on-write race condition that has existed in the Linux kernel since the 2017 update cycle.

Theori reported the flaw responsibly to the Linux kernel security team, and a patch has been released for most major distributions. However, system administrators are urged to apply updates immediately as the exploit code is already circulating in the wild.

Critical 'Copy Fail' Linux Bug Grants Root Access to Any User – AI-Powered Discovery
Source: www.theverge.com

What This Means

Every system running a Linux kernel version 4.11 or later is at risk. This includes servers, cloud instances, IoT devices, and even desktop Linux installations. Any user with shell access – even unprivileged accounts – can become root using the Copy Fail script.

IT teams should prioritize patching their Linux fleet, especially systems exposed to the internet or multi-tenant environments. Traditional intrusion detection systems may not flag the exploit because it uses standard system calls and leaves minimal log entries.

Users are advised to verify their distribution's security advisory for package linux-image-* and apply the latest kernel update. A reboot will be required after installation.

Key Facts at a Glance

  • Vulnerability: Copy Fail (CVE-2026-31431) – privilege escalation
  • Affected: Linux distributions released since 2017
  • Impact: Any user can gain root access
  • Discovery: Theori using AI scanning
  • Status: Publicly disclosed; patches available

For a technical deep dive, refer to Theori's official advisory or the kernel.org changelog.

Recommended