NY23:01
    LDN04:01
    HKG11:01
    TYO12:01
    Gold4,499-0.29%
    Bitcoin75,480-2.78%
    Gold4,499-0.3%
    Bitcoin75,480-2.8%
    LATEST NEWS
    Minnesota Feeding Our Future leader gets 41 years for $250 million fraud35 minutesDevon buys 16,300 Delaware Basin acres for about $2.6 billion36 minutesBurnham launches Makerfield by-election bid as Greens reopen selectionabout 2 hoursDHS updates public events feed, spotlighting activities tied to its Washington headquartersabout 2 hoursDC parks agency centralizes neighborhood programming on official events pageabout 2 hoursDC Public Library Launches Dig DC: The People's Archive Digital Repositoryabout 2 hoursDC.gov's official events calendar lists public programs across the Districtabout 2 hoursDistrict posts DPR-1 Articles of Incorporation for domestic professional corporationsabout 2 hoursDC posts central hub for unemployment insurance tax forms and guidanceabout 2 hoursOpen Data DC centralizes the city’s public datasets for residents and researchersabout 2 hoursDC Department of Health publishes official Marriage and Family Therapy licensing pageabout 2 hoursDistrict posts draft ANC support letter for Reservoir Road traffic calmingabout 2 hoursDC’s licensing hub: Department of Licensing and Consumer Protection’s occupational and professional portalabout 2 hoursDC Public Library says catalog isn't sending digital hold alerts; manage holds via Libbyabout 2 hoursDC.gov Hosts District’s Official Events Calendar for Public Programs and Meetingsabout 2 hoursMinnesota Feeding Our Future leader gets 41 years for $250 million fraud35 minutesDevon buys 16,300 Delaware Basin acres for about $2.6 billion36 minutesBurnham launches Makerfield by-election bid as Greens reopen selectionabout 2 hoursDHS updates public events feed, spotlighting activities tied to its Washington headquartersabout 2 hoursDC parks agency centralizes neighborhood programming on official events pageabout 2 hoursDC Public Library Launches Dig DC: The People's Archive Digital Repositoryabout 2 hoursDC.gov's official events calendar lists public programs across the Districtabout 2 hoursDistrict posts DPR-1 Articles of Incorporation for domestic professional corporationsabout 2 hoursDC posts central hub for unemployment insurance tax forms and guidanceabout 2 hoursOpen Data DC centralizes the city’s public datasets for residents and researchersabout 2 hoursDC Department of Health publishes official Marriage and Family Therapy licensing pageabout 2 hoursDistrict posts draft ANC support letter for Reservoir Road traffic calmingabout 2 hoursDC’s licensing hub: Department of Licensing and Consumer Protection’s occupational and professional portalabout 2 hoursDC Public Library says catalog isn't sending digital hold alerts; manage holds via Libbyabout 2 hoursDC.gov Hosts District’s Official Events Calendar for Public Programs and Meetingsabout 2 hours
    Politics

    Critical Flaw Exposes Linux Systems to Root Access

    Linux kernel vulnerability (CVE-2026-31431) grants root access to local attackers. Patches exist, but deployment varies.

    Published4 May 2026, 03:00:29
    Critical Flaw Exposes Linux Systems to Root Access
    A360
    Key Takeaways✦ Atlas AI
    01

    A critical Linux kernel vulnerability, 'Copy Fail' (CVE-2026-31431), allows unprivileged local attackers to gain root access on systems running kernels since 2017, posing a significant security risk.

    02

    This flaw, stemming from a logic error in the kernel's cryptographic template, enables manipulation of setuid-root binaries, highlighting the importance of robust code review in core system components.

    03

    Organizations must urgently patch affected Linux systems, especially multi-tenant environments, or apply interim mitigations to prevent widespread exploitation, as proof-of-concept exploits are already reliable and available.

    Atlas AI

    Atlas AI

    A local privilege escalation vulnerability, tracked as CVE-2026-31431 and dubbed "Copy Fail," has been identified in Linux kernels since 2017. This flaw allows an unprivileged local attacker to gain root permissions on affected systems.

    The vulnerability stems from a logic error in the Linux kernel's cryptographic template, enabling a 4-byte write into the page cache of any readable file. This can alter the behavior of setuid-root binaries, granting an attacker root privileges.

    Proof-of-concept exploits have been developed and tested on multiple major Linux distributions, including Ubuntu 24. 04 LTS, Amazon Linux 2023, RHEL 10.1, and SUSE 16. The exploit is described as highly reliable and broadly applicable across distributions.

    Patches addressing CVE-2026-31431 were released in early April, reverting a problematic "in-place" crypto optimization introduced in 2017. While some distributions are pushing updates, official advisories for the CVE are not universally available.

    Organizations are advised to prioritize patching multi-tenant Linux hosts, container clusters, and cloud SaaS environments. An interim mitigation involves disabling the vulnerable crypto interface or the `algif_aead` module.

    Share

    Related Articles

    Atlas360

    Sign up for Atlas Daily

    The daily global news briefing you can trust.

    every weekday·Read it now

    or
    Sign in

    Already subscribed? Sign in and we won't show you this message again.