Copy Fail – CVE-2026-31431

One tiny script, four Linux break-ins, and the comments are absolutely losing it

TLDR: A newly published Linux bug lets a regular user take over major systems with a tiny script, making it a big deal for servers and shared machines. Commenters are split between outrage at vendors moving slowly, anger at the risky feature behind it, and jokes that even the headline wasn’t dramatic enough.

Linux users just got hit with the kind of security story that makes sysadmins spill their coffee: a tiny public demo script can turn a normal account into full control on multiple major Linux systems, and commenters are reacting like they’ve seen a ghost in the server room. The demo’s big flex is that it works across Ubuntu, Amazon Linux, Red Hat, and SUSE without custom tweaks, which sent the community straight into “how is this real?” mode.

The loudest reaction came from people furious at the feature tied to the bug. One kernel crypto developer flat-out said it “should not exist,” calling it a giant, unnecessary doorway for trouble. That set the tone: part panic, part blame game, part long-overdue “I told you so.” Then came the vendor drama. One commenter pointed out that some Linux vendors were still rating this as only moderately serious or delaying fixes, which sparked disbelief because the bug can hand over a root shell — basically, the keys to the kingdom — with scary ease.

There was also classic internet comedy in the mix. One person helpfully translated the scary test command into something more readable for cautious admins, while another grumbled that the original write-up made it weirdly hard to tell which versions were actually fixed. And in peak Hacker News fashion, someone even argued the headline itself was too chill for a bug this dramatic. In other words: the exploit is bad, the reactions are hotter, and the naming debate is somehow part of the chaos too.

Key Points

  • The article describes Copy Fail (CVE-2026-31431) as a Linux local privilege-escalation flaw that can yield root across multiple major distributions using the same exploit binary.
  • It says affected systems include kernels built between 2017 and the patch, with AF_ALG enabled by default on essentially every mainstream Linux distribution.
  • The write-up states exploitation requires only an unprivileged local user account and no network access, kernel debugging features, or pre-installed primitives.
  • The article says the published PoC modifies the page cache of a setuid binary, creating a real but non-persistent root shell that disappears after reboot or cache eviction.
  • Recommended mitigation is to update to a kernel containing commit a664bf3d603d or, before patching, disable the algif_aead module and consider blocking AF_ALG sockets via seccomp for untrusted workloads.

Hottest takes

"AF_ALG ... should not exist" — ebiggers
"vendors aren't treating this vulnerability as serious" — xeeeeeeeeeeenu
"can we edit the Title to add some context that it’s a major Linux vulnerability?" — jeffwass
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.