Skip to main content
See every side of every news story
Published loading...Updated

'CopyFail' Attackers Start Cashing in on Linux Flaw

Security researchers say exploit code is being used in the wild, and the flaw can give limited users full root access on affected systems.

  • On Friday, the Cybersecurity and Infrastructure Security Agency added CVE-2026-31431 to its known exploited vulnerabilities catalog, ordering all civilian federal agencies to patch affected systems by May 15.
  • Dubbed CopyFail, the high-severity vulnerability was discovered by Theori using its Xint platform in Linux kernel versions 7.0 and earlier, affecting nearly every mainstream Linux kernel built since 2017.
  • While attackers actively exploit the flaw in the wild, Caitlin Condon, vice president of security research at VulnCheck, criticized the disclosure for relying on AI-generated content, calling it "AI slop" that "detracts from technical reality."
  • Developer Jorijn Schrijvershof described the bug as having an "unusually big blast radius" affecting Debian, Fedora, and Kubernetes, potentially allowing attackers to access every application and database within a datacenter.
  • Hundreds of additional proof-of-concept exploits have surfaced since the vulnerability was disclosed five days ago; organizations should exercise caution when running untested research artifacts, including AI-generated exploit code.
Insights by Ground AI

16 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

Heise broke the news in Germany on Monday, May 4, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal