Gaming on Linux has by no means been higher—however that does not imply your distros are free from safety threats. Working example is a extreme vulnerability nicknamed ‘Copy Fail,’ which permits an area person to dig into the heart of the OS and provides themselves root privileges merely by writing 4 bytes of managed information into the web page cache of any readable file.
The safety analysis staff at Theori disclosed the vulnerability final Wednesday, although CISA experiences that risk actors have since been noticed utilizing the exploit within the wild. The safety flaw has been given the designation CVE-2026-31431 and marked with a excessive severity rating of seven.8 (through Bleeping Laptop).
It is because Copy Fail may doubtlessly go away numerous Linux customers uncovered—in case you’ve not up to date your kernel in a scorching minute, now can be the time. Theori places it succinctly in its write-up, summarising, “A single 732-byte Python script can [be used to] acquire root on primarily all Linux distributions shipped since 2017.”
As such, CISA added the vulnerability to its Recognized Exploited Vulnerabilities Catalog. In accordance with ‘Binding Operational Directive (BOD) 22-01’, this transfer in flip requires Federal Civilian Government Department businesses primarily based all through the USA to replace their programs by Might 15 to be able to shield their programs towards this energetic risk.
CISA warns, “Any such vulnerability is a frequent assault vector for malicious cyber actors and poses vital dangers to the federal enterprise.”
Cybersecurity agency Theori additionally affords a extra digestible Copy Fail information. This consists of the safety analysis staff’s authentic Proof of Idea script so “defenders can confirm their very own programs and validate vendor patches.” It is price clarifying that this script requires native entry to a machine operating Linux, and that the safety vulnerability isn’t an instance of distant code execution.
The staff discovered the identical script works in Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, and SUSE 16, however clearly, loads of different Linux distros are additionally affected.
This information follows claims made final week by Canonical—the corporate that created Ubuntu—that its internet infrastructure was below a “sustained, cross-border assault”. Although the Copy Fail vulnerability was disclosed by Theori across the identical time, the exploit will not be guilty. Canonical has but to offer an replace after its X submit on Might 1st.

Greatest PC gaming package 2026
All our favourite gear





