Close Menu
    Facebook X (Twitter) Instagram
    星期六, 2 5 月
    Instagram Pinterest TikTok RSS
    • Home
    • Categories
      • Fashion
      • Beauty
      • Tech
    • Seasonal
    • Guides
    Home - Severe Linux Copy Fail security flaw uncovered using AI scanning help
    Tech

    Severe Linux Copy Fail security flaw uncovered using AI scanning help

    longdaBy longda2026年5月2日没有评论2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Nearly every Linux distribution released since 2017 is currently vulnerable to a security bug called “Copy Fail” that allows any user to give themselves administrator privileges. The exploit, publicly disclosed as CVE-2026-31431 on Wednesday, uses a Python script that works across all of the vulnerable Linux distributions, requiring “no per-distro offsets, no version checks, no recompilation,” according to Theori, the security firm that uncovered it.

    Ars Technica points out this blog post where DevOps engineer Jorijn Schrijvershof explains that what makes Copy Fail “unusually nasty” is the likelihood for it to go unnoticed by monitoring tools: “Page-cache corruption never marks the page dirty. The kernel’s writeback machinery never flushes the modified bytes back to disk.” As a result, “AIDE, Tripwire, OSSEC and any monitoring tool that compares on-disk checksums see nothing.”

    Copy Fail was identified by Theori’s researchers with assistance from their Xint Code AI tool. According to a blog post, Taeyang Lee had an idea of looking into the crypto subsystem of Linux and created this prompt to run an automated scan that identified several vulnerabilities in “about an hour.”

    “This is the linux crypto/ subsystem. Please examine all codepaths reachable from userspace syscalls. Note one key observation: splice() can deliver page-cache references of read-only files (including setuid binaries) to crypto TX scatterlists.”

    According to the exploit’s disclosure page, a patch for Copy Fail was added to the mainline Linux kernel on April 1st. However, as Ars Technica notes, the researchers who identified Copy Fail published the details of the exploit publicly before all of the affected distributions could release patches for it. Some distros, including Arch Linux, RedHat Fedora, and Amazon Linux, have released patches, but many others were not immediately able to address the issue.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMet Gala Modelpalooza: All the Looks, All the Credits, All in One Place
    Next Article Jennifer Lawrence Adds an It-Girl Favorite to Her Statement Bag Collection
    longda
    • Website

    Related Posts

    Amazon’s built-in AI price history expands to show the entire last year

    2026年5月2日

    Aurzen’s teeny tiny tri-fold projector is on sale for 40 percent off

    2026年5月1日

    Pentagon strikes classified AI deals with OpenAI, Google, and Nvidia — but not Anthropic

    2026年5月1日
    Leave A Reply Cancel Reply

    • Facebook
    • Twitter
    • Instagram
    • Pinterest
    About

    SonemGlobal is a blog-style product discovery site that shares curated recommendations across fashion, beauty, home, tech, and gifts. We highlight top picks, affordable finds, helping readers discover great products easily.

    We're social, connect with us:

    Facebook X (Twitter) Pinterest
    HELP
    • About Us
    • Contact Us
    • Accessibility Policy
    • Privacy Policy
    • Terms of Use
    • Disclaimer
    Copyright © 2026. Designed by sonemglobal.com.
    • About Us
    • Contact Us
    • Accessibility Policy
    • Privacy Policy
    • Terms of Use
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.