Tenbyte Cloud responds to the "Copy Fail" Local Root Vulnerability exploit

Copy Fail (CVE-2026-31431) allows any unprivileged Linux user to gain root access. Learn how Tenbyte Cloud is responding and what you need to do to stay safe.

Copy Fail (CVE-2026-31431)
TL;DR: A critical Linux kernel LPE vulnerability was disclosed on April 29, 2026. It affects every major Linux distribution since 2017 and has a working public exploit. The Tenbyte Cloud platform is not affected — VM isolation prevents cross-tenant exploitation. Your individual Linux servers still need patching. Update your kernels and reboot.

On April 29, 2026, security researchers at Theori disclosed a local privilege escalation (LPE) vulnerability in the Linux kernel. It's called "Copy Fail" — and it's as bad as LPEs get.

The bug lives in the kernel's algif_aead crypto interface. By abusing the splice() system call through AF_ALG, an unprivileged process can write arbitrary data directly into the host's page cache. From there, overwriting /etc/passwd or dropping SSH keys into /root/.ssh/authorized_keys is trivial. Full root shell, no race window, no kernel offsets to calculate.

The public exploit is 732 bytes of Python. It works reliably against Ubuntu, Amazon Linux, RHEL, and SUSE — every distribution since kernel 4.14 (2017).

What's more notable than the bug itself is how it was found: Theori's AI system, Xint Code, surfaced it in roughly an hour with a single prompt. No harnessing, no manual triage. This is a watershed moment for vulnerability research — and it means the supply of critical kernel bugs is about to increase.



Is the Tenbyte Cloud Platform Affected?

No. Tenbyte Cloud runs each Cloud Server inside its own virtual machine with an isolated kernel. Copy Fail is a kernel-level exploit — it cannot cross VM boundaries. A compromised Cloud Server cannot reach the underlying hypervisor, cannot access the host's page cache, and cannot interfere with any other customer's server.

We've verified this across our entire fleet. Our hosts are safe.


What We've Already Done

  • Verified all host systems — confirmed no Tenbyte infrastructure is exposed.
  • Preparing updated OS templates — as upstream patches land, new deployments will ship patched kernels by default
  • Monitoring upstream releases — tracking every major distribution's security mailing list in real time


What You Need to Do

Your individual Linux Cloud Servers are affected at the OS level. Patching them is your responsibility.


Patch your servers

Distribution Family

Command for Update Check and Download

Command for Applying Updates

Debian / Ubuntu

sudo apt update

sudo apt upgrade

Alma / CentOS / Fedora / Rocky

sudo dnf check-update

sudo dnf upgrade

The vulnerability lives in the running kernel. A reboot is not optional — the patched kernel must be loaded at boot.


Risk Assessment: Who Should Treat This as Urgent

All Linux systems are technically vulnerable. But the real risk depends on your access model.

P1 — Patch within 24 hours

  • Servers with untrusted local users (shared hosting, multi-tenant environments)
  • CI/CD runners executing third-party code (self-hosted GitHub Actions, GitLab shared runners, Jenkins agents)
  • AI code-execution sandboxes running untrusted output inside containers
  • Any server that allows remote code execution by unprivileged users

The public exploit is reliable and trivial. If an attacker already has a foothold, root is one command away.

P2 — Patch at normal cadence

  • Servers where only trusted administrators have access
  • No untrusted code execution paths
  • Network perimeter is tightly controlled

Copy Fail is a local privilege escalation, not remote code execution. But don't sit on it — patch within your normal window.


Technical Deep Dive

For those who want to understand the mechanics — not just the fix.

How the exploit works

  1. The attacker opens an AF_ALG socket using the algif_aead interface
  2. Via splice(), data is moved between pipes and the crypto interface
  3. A logic flaw in the kernel's algif_aead implementation causes it to incorrectly handle the splice() completion — it writes to the wrong memory location
  4. This incorrect write lands in the host page cache — the kernel's cache of file contents
  5. By controlling what gets written and where, the attacker overwrites files like /etc/passwd to add a root-level user, or drops SSH keys into /root/.ssh/authorized_keys
  6. The attacker now has root access

Why container escape is possible

On shared-kernel container platforms (Kubernetes, Docker, etc.), the page cache is shared across all containers on that host. A process inside one container can overwrite files that affect the host and other containers. This is why multi-tenant Kubernetes clusters and CI/CD runners are at the highest risk.

What's not affected

  • VM-based infrastructure — separate kernels, separate page caches
  • Firecracker microVMs — what AWS Lambda and Fargate use
  • gVisor — user-space kernel, doesn't expose algif_aead
  • Cloudflare Workers — V8 isolates, no Linux kernel in the threat model
  • Dedicated bare-metal — single tenant, no cross-contamination risk

The pattern is consistent: isolation breaks when kernels are shared.

The AI angle

Theori's Xint Code found this bug in about an hour. For context, zero-day brokers like Crowdfense pay $10K–$7M for universal, reliable Linux LPEs. An AI system surfaced one in the time it takes to get lunch.

This doesn't mean AI is replacing security researchers — Theori's team is among the best in the world (9x DEF CON CTF winners). It means AI is a force multiplier that's changing the economics of vulnerability discovery. Defenders need to adapt: faster patch cycles, stronger isolation boundaries, and assume-breach postures.

Further Reading