CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

High-severity Linux kernel authencesn logic bug (CVE-2026-31431) enables local privilege escalation

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A high-severity zero-day vulnerability in the Linux kernel, tracked as CVE-2026-31431 and nicknamed Copy Fail, has been disclosed after existing undetected since 2017. The flaw is a logic bug in the kernel’s authencesn cryptographic template that permits an unprivileged local user to perform a deterministic four-byte write into the page cache of any readable file on the system. Successful exploitation allows an attacker to escalate privileges to root on affected Linux distributions released since 2017, requiring only a local account and physical access to the target machine. The vulnerability affects multi-user shared systems, containerized environments (Kubernetes, Docker), and similar setups, enabling potential unauthorized access to other users’ data. It has been assigned a CVSS score of 7.8 (High severity).

Timeline

  1. 01.05.2026 13:45 1 articles · 1h ago

    CVE-2026-31431 patch deployed for Linux kernel authencesn logic bug after nine-year exposure

    The Linux kernel security team assigned CVE-2026-31431 on April 22, 2026, and Theori publicly disclosed the flaw on April 29, 2026. A patch reverting a 2017 optimization in the authencesn template was integrated into major Linux distributions, including Debian, Ubuntu, SUSE, and Red Hat.

    Show sources

Information Snippets