Forgot your password?
typodupeerror
Security Microsoft Windows Linux

Microsoft Issues Warning About Linux 'Copy Fail' Vulnerability (linux-magazine.com) 46

joshuark shares a report from Linux Magazine: Microsoft has issued a warning that a vulnerability with a CVSS score of 7.8 has been found in the Linux kernel. The vulnerability in question is tagged CVE-2026-31431 and, according to the Cybersecurity and Infrastructure Security Agency (CISA), "This Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise."

The distributions affected are Ubuntu, Red Hat, SUSE, Debian, Fedora, Arch Linux, and Amazon Linux. This could also affect any distribution based on those in the list, which means pretty much every Linux distro that isn't independent. The flaw is found in the Linux kernel cryptographic subsystem's algif_aead module of AF_ALG. The problem is that a particular optimization has led to the kernel reusing the source memory as the destination during cryptographic operations. What this means is that attackers can take advantage of interactions between the AF_ALG socket interface and a splice() system call. Until patches are released, Microsoft is advising that the affected crypto feature should be disabled, or AF_ALG socket creation should be blocked.
The vulnerability is also known as "Copy Fail," which has been shared on Slashdot and detailed in a technical report. The vulnerability affects almost every version of the Linux OS and is now being exploited in the wild. U.S. cybersecurity agency CISA has ordered all civilian federal agencies to patch any affected systems by May 15.

Microsoft Issues Warning About Linux 'Copy Fail' Vulnerability

Comments Filter:
  • by CAIMLAS ( 41445 ) on Thursday May 07, 2026 @04:19PM (#66132888)

    This is literally the third /. mention of this in a very short period of time, nevermind the fact that it's been broadcast literally everywhere and is the biggest security vuln found since sliced bread (or heartbleed). It's been fixed and available for "ages" now on every major distro.

    • Re:What gives? (Score:4, Insightful)

      by nightflameauto ( 6607976 ) on Thursday May 07, 2026 @04:33PM (#66132904)

      This is literally the third /. mention of this in a very short period of time, nevermind the fact that it's been broadcast literally everywhere and is the biggest security vuln found since sliced bread (or heartbleed). It's been fixed and available for "ages" now on every major distro.

      One would almost begin to suspect that there is a vested interest in making Linux appear to be far more vulnerable than the "alternatives" to Linux.

    • Re:What gives? (Score:4, Informative)

      by HiThere ( 15173 ) <charleshixsn@e[ ... t ['art' in gap]> on Thursday May 07, 2026 @04:33PM (#66132906)

      Not for ages. Less than a week. For many, that's not time enough to get the patch.

      OTOH, it's a local vulnerability, so many systems aren't affected. I've got one that hasn't been hooked up to the internet in well over a month, and it won't be affected until the next time it's hooked up. (I may do a reinstall before then.)

      • OTOH, it's a local vulnerability, so many systems aren't affected.

        We keep acting like we're still in the world of bare metal and VM based servers. But so much of the world is running on containerized (kubernetes, docker, etc) and lambda compute nowdays, and thats where these sorts of bugs get dangerous. It takes one docker container running a shitty unpatched version of wordpress or some nodejs slop and you have your platform for bypassing the containers CG Group and pwning the kernel, granting access to po

        • by HiThere ( 15173 )

          Also, the larger companies are more likely to update their own equipment. (Yeah, not always. Sigh.) But I was more thinking of small devices, often embedded, that aren't usually updated.

    • Also, why the fuck is it news that Microsoft is posting about it? TFS or TFA give absolutely no indication as to why.

      This is just a dupe, nothing more.

      • Re: (Score:2, Funny)

        by Cpt_Kirks ( 37296 )

        Also, why the fuck is it news that Microsoft is posting about it? TFS or TFA give absolutely no indication as to why.

        This is just a dupe, nothing more.

        Because M$ is THE EXPERT on vulnerabilities.

    • by znrt ( 2424692 )

      our apologies, sir. would you prefer a slashvertisement instead?

    • Re:What gives? (Score:4, Interesting)

      by bloodhawk ( 813939 ) on Thursday May 07, 2026 @06:00PM (#66133038)
      Not really ages, a week. mind you the article they are talking about is a week old and related to Microsoft Defender which is used by customers to monitor cloud servers, many of which are unsuprisingly linux. So while this slashdot article seems to try and imply it is MS pointing fingers, it is nothing of the sort. It is just a standard blog article warning its userbase of an at the time very serious vulnerability, why it is here a week later on slashdot is another question.
      • by CAIMLAS ( 41445 )

        That is literally ages in 2026 internet time. The world itself moves much faster. Entire nations have been toppled in less than a day, in the past year. A week is an eternity to wait to mention something like this, particularly when it's literally just a repost of something that was posted a week ago.

  • Pffft... (Score:5, Informative)

    by dskoll ( 99328 ) on Thursday May 07, 2026 @04:43PM (#66132928) Homepage

    Old news and 3 times on Slashdot. The new kids have already moved on to Dirty Frag [github.com], a new Linux local privilege escalation vulnerability.

    • The new kids have already moved on to Dirty Frag [github.com], a new Linux local privilege escalation vulnerability.

      Question is, who's the jackass that broke the embargo on this one?

  • Not news (Score:5, Informative)

    by Himmy32 ( 650060 ) on Thursday May 07, 2026 @04:53PM (#66132944)

    The article doesn't even link to the Microsoft article [microsoft.com], which is on the Microsoft Defender blog. This isn't a huge surprise since that's Microsoft's security product that covers cloud servers including in Azure, AWS and GCP [microsoft.com].

    So the sub-text of this being Microsoft pointing out Linux vulns is pretty silly since Microsoft makes a lot of money off of people running Linux on their cloud and on their competitors' kit. Outside of that, the rest of this has already been covered.

    • Re:Not news (Score:4, Insightful)

      by thegarbz ( 1787294 ) on Thursday May 07, 2026 @08:11PM (#66133284)

      So the sub-text of this being Microsoft pointing out Linux vulns is pretty silly since Microsoft makes a lot of money off of people running Linux on their cloud and on their competitors' kit.

      It's not silly at all precisely FOR this reason. Microsoft not only ships Linux, but WSL distros are also affected (as of right now if you install Ubuntu from the Microsoft store you will be vulnerable). Also read the Microsoft article you linked. Microsoft is pointing this out because Defender has been updated to help scan for CopyFail exploitation toolkits as well as identify vulnerable systems in your enterprise environemnt.

      Why is it silly for Microsoft's Defender team to literally do the job you pay them to do and publish advisories on their software updates?

  • https://dirtyfrag.io. Nearly the same vulnerability, different access vector.

  • Anybody competent has already patched it or at least done the temporary fix.

  • by evorster ( 2664141 ) on Thursday May 07, 2026 @10:27PM (#66133448) Homepage

    If MS was being honest here, they would have stated that OUT OF DATE Linux is vulnerable.
    Unlike MS, the Linux community fixes their issues and moves on.

    • Re: (Score:2, Insightful)

      by thegarbz ( 1787294 )

      If MS was being honest here, they would have stated that OUT OF DATE Linux is vulnerable.
      Unlike MS, the Linux community fixes their issues and moves on.

      False. Not only are there several distributions which have not yet rolled out a fix, but there are several distributions available in the Windows Store *right now* for WSL2 which are vulnerable.

      There's nothing dishonest about what MS said, only the framing of articles talking about what MS said. MS stuck 100% to the facts and their release on Defender updates for enterprise specifically mentions what it is they are detecting.

      Unlike MS, the Linux community fixes their issues and moves on.

      That is horseshit on both accounts. The world is full of vulnerable unpatched Linux

  • by ShakaUVM ( 157947 ) on Thursday May 07, 2026 @10:45PM (#66133474) Homepage Journal

    My server got compromised last week by this, Slashdot is quite far behind.

    There's two new exploits in the Copy Fail class that do privilege escalation everyone should be worried about on shared servers. Copy Fail 2: Electric Boogaloo (https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo) and Dirty Frag (https://github.com/V4bel/dirtyfrag)

    I am rather disappointed that Ubuntu sat on these LPEs for a month without releasing a fix.

  • SO Microsoft is so worried about Linux, it now has to call out issues on it?
    • by quenda ( 644621 )

      Microsoft embraced Linux years ago. And so far, no sign of "extend". WSL2 is awesome.
      Nadella is no Balmer.

Computer Science is the only discipline in which we view adding a new wing to a building as being maintenance -- Jim Horning

Working...