Copy.Fail Linux Vulnerability

Summary

A critical Linux kernel vulnerability named 'copy.fail' has been disclosed, allowing local privilege escalation. The exploit abuses the kernel crypto API and splice() to write data directly into a file's page cache, bypassing standard file modification detection. It affects a wide range of Linux distributions without requiring distro-specific offsets.

IFF Assessment

FOE

This vulnerability allows an attacker to gain elevated privileges, which is detrimental to defenders.

Severity

7.8 High

The vulnerability is a local privilege escalation (Attack Vector: Local, Privileges Required: Low, User Interaction: None) with a significant impact on confidentiality, integrity, and availability (Impact: High). The exploit is described as working unmodified across many distributions, indicating high exploitability.

CISA KEV: Listed as actively exploited. Federal patch due: May 15, 2026. Known ransomware use: Unknown.

Defender Context

Defenders need to be aware of this critical local privilege escalation vulnerability in the Linux kernel, as it can be exploited across many distributions. Prompt patching or implementing mitigating controls for AF_ALG sockets and splice() functionality will be crucial to prevent unauthorized system access and data manipulation.

Read Full Story →