On April 29, 2026, details about the ‘Copy Fail’ vulnerability (CVE-2026-31431) were publicly disclosed. This high-severity (CVSS score of 7.8) privilege escalation vulnerability impacts Linux distributions shipped since 2017. It allows an unprivileged local user to obtain root-level access on affected Linux systems by corrupting the kernel’s in-memory page cache of a privileged binary.
Public proof-of-concept (PoC) exploit code has been released, and reports indicate the exploit is reliable across multiple major Linux distributions. Given the breadth of affected systems and the trivially small exploit, organizations should prioritize patching, particularly for multi-tenant Linux hosts and container platforms.
Recommended actions
Counter Threat Unit™ (CTU) researchers recommend that organizations identify Linux systems running vulnerable kernel versions and apply appropriate vendor-issued kernel updates as soon as possible. In environments where immediate patching is not feasible, administrators should review temporary mitigations recommended by their Linux distribution vendors and minimize exposure to untrusted local code execution. In response to the disclosure, Linux distributions have released their own advisories:
- https://explore.alas.aws.amazon.com/CVE-2026-31431.html
- https://security.archlinux.org/CVE-2026-31431
- https://blog.cloudlinux.com/cve-2026-31431-copy-fail-mitigation-and-patches
- https://security-tracker.debian.org/tracker/CVE-2026-31431
- https://bugs.gentoo.org/show_bug.cgi?id=CVE-2026-31431
- https://access.redhat.com/security/cve/cve-2026-31431
- https://www.suse.com/security/cve/CVE-2026-31431.html
- https://ubuntu.com/security/CVE-2026-31431
Sophos protections
SophosLabs is monitoring this vulnerability and investigating detection and mitigation opportunities associated with exploitation activity. Sophos analysts are exploring threat hunting opportunities to identify potentially impacted customers and have evaluated if Sophos products are affected by this issue.

