Categories: Cyber Security News

CISA Warns of Linux Kernel 0-Day Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel zero-day vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning federal agencies and organizations worldwide to patch immediately or discontinue use of affected systems.

Tracked as CVE-2026-31431 and dubbed “Copy Fail”, the flaw carries a CVSS score of 7.8 (High) and is classified under CWE-699 (Incorrect Resource Transfer Between Spheres).

The vulnerability resides in the algif_aead module of the Linux kernel’s AF_ALG cryptographic subsystem specifically, a logic bug in the authentication cryptographic template that causes improper memory handling during in-place operations.

What makes this flaw particularly alarming is its exploitability: a 732-byte Python script is all an unprivileged local user needs to reliably escalate privileges to root.

Nine-Year-Old Bug Hiding in Plain Sight

Despite being disclosed publicly on April 29, 2026, the vulnerability has roots stretching back nearly a decade.

It was introduced through three separate, individually harmless changes made to the Linux kernel in 2011, 2015, and 2017, none of which raised red flags independently.

The flaw affects every major Linux distribution running kernels built since 2017, including Ubuntu 24.04 LTS, Amazon Linux 2023, Red Hat Enterprise Linux 10.1, SUSE 16, Debian, Fedora, and Arch Linux.

The attack chain exploits the interaction between the AF_ALG socket interface, the splice() system call, and improper error handling during a failed copy operation.

This results in a controlled 4-byte overwrite in the kernel page cache, allowing an attacker to corrupt setuid binaries and other sensitive kernel-managed data entirely within kernel space, bypassing traditional user-space protections.

Critically, exploitation requires no root privileges inside containers, no kernel modules, and no network access, making it a powerful post-exploitation tool in containerized environments, including Kubernetes clusters and Docker CI runners.

CISA added CVE-2026-31431 to its KEV catalog on May 1, 2026, with a mandatory remediation deadline of May 15, 2026, for all federal civilian agencies. Patches are available in Linux kernel versions 6.18.22, 6.19.12, and 7.0.

Organizations running Red Hat Enterprise Linux can apply configuration-level mitigations while patches are deployed.

CISA directs all organizations to apply vendor-issued mitigations immediately, follow BOD 22-01 guidance for cloud services, or discontinue use of unpatched systems.

Security teams are strongly urged to audit Linux kernel versions across cloud workloads, container environments, and on-premises infrastructure without delay, as active exploitation in the wild has already been confirmed.

Free Webinar to align your endpoint security to meet new requirements – Register Now

The post CISA Warns of Linux Kernel 0-Day Vulnerability Exploited in Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Resident Evil Requiem Producer Sees DLSS 5 AI Backlash as ‘a Positive’ Because ‘It Meant We Got the Design Right’

Resident Evil Requiem producer Masato Kumazawa has said Capcom sees the drama surrounding the DLSS…

1 minute ago

Isa Briones Blasts ‘Disrespectful’ Fans for Yelling Pitt References During Her Broadway Show

The Pitt star Isa Briones has called out "f**king disrespectful" fans for yelling references while…

1 minute ago

Pinecone targets agentic completion rates

Pinecone has released Pinecone Nexus, a knowledge engine designed to move reasoning from retrieval to…

16 minutes ago

Five tips to use AI in loyalty and promotions campaigns

Enterprise Times met with Michal Sedzielewski co-founder of Voucherify at the MACH X event in…

16 minutes ago

Using AI to enable automations

Companies embarking on their first investments in Artificial Intelligence-led projects aim to use the new…

16 minutes ago

DOJ Sentences Two Americans to Prison for ALPHV BlackCat Attacks on U.S. Victims

Two American cybersecurity professionals were sentenced to four years each in federal prison on April…

1 hour ago

This website uses cookies.