Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Zero-Day Flaw in Linux Kernel Found by AI-Equipped Security Researcher

May 1, 2026

Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages

May 1, 2026

Why Organizations Need to do Protect Against Phishing-as-a-Service

May 1, 2026
Facebook X (Twitter) Instagram
Friday, May 1
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Zero-Day Flaw in Linux Kernel Found by AI-Equipped Security Researcher
News

Zero-Day Flaw in Linux Kernel Found by AI-Equipped Security Researcher

Team-CWDBy Team-CWDMay 1, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new high-security zero-day vulnerability that has lurked in the Linux kernel since 2017 has just been found with the help of AI.

This nine-year-old flaw, dubbed ‘Copy Fail’, was discovered by Taeyang Lee, a vulnerability researcher at offensive security firm Theori

Lee openly disclosed he used Xint Code, a source code analyzing tool part of Theori’s AI-driven penetration testing platform, Xint.io, to discover the vulnerability.

He reported the vulnerability to the Linux kernel security team on March 23, who started working on a patch over the next few days.

The Linux kernel security team assigned Copy Fail a unique CVE identifier, CVE-2026-31431, on April 22 and Xint.io publicly disclosed it seven days later.

Copy Fail: An Old Linux Kernel Vulnerability

Copy Fail is a logic bug in the Linux kernel’s authencesn cryptographic template. It lets an unprivileged local user trigger a deterministic, controlled four-byte write into the page cache of any readable file on the system.

Exploiting this vulnerability can allow an attacker to gain root access to the Linux kernel of a machine for all Linux distributions shipped since 2017.

While it requires no network access, no kernel debugging features and no pre-installed primitives to successfully exploit the vulnerability, the attacker must have physical access to the target machine, with an unprivileged local user account.

The vulnerability poses a risk to multi-user shared systems, container clusters (Kubernetes, Docker, etc.), and similar environments. A regular user could potentially access other users’ data as a result.

The vulnerability has been attributed a high-severity rating (CVSS) of 7.8.

Theori has published a proof-of-concept (PoC) exploit so defenders can verify their own systems and validate vendor patches.

The patch is now available. It reverts the optimization for Authenticated Encryption with Associated Data (AEAD) operations that was added in 2017.

“Update your distribution’s kernel package to a version that includes commit a664bf3d603d from the main branch,” the researchers said.

Most major Linux distributions, such as Debian, Ubuntu, SUSE and Red Hat now provide this fix.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleApple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages
Team-CWD
  • Website

Related Posts

News

Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages

May 1, 2026
News

Two Cybersecurity Workers Jailed for BlackCat Ransomware Attacks

May 1, 2026
News

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

May 1, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

How cybercriminals are targeting content creators

November 26, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.