At first glance, reports of a critical vulnerability in almost every conceivable Linux distribution looked overblown. But CVE-2026-31431, aka Copy Fail, is indeed a Big Problem. A very stable and straightforward exploit" confirms Costin Raiu. The key takeaway? Local privilege escalation (LPE) to Root on almost every Linux distribution since 2017, using a simple Python script. Most distros are still exposed. Found by Theori's Xint Code using an LLM pointed at the Linux kernel "for about an hour." 👉 https://lnkd.in/e8upAdWG
Linux CVE-2026-31431 Exploit Allows Root Access
More Relevant Posts
-
🤖 Oops. AI found a nine year old kernel vulnerability that lets attackers root Linux boxes with 732 bytes of Python code. "Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017." The fun part? The exploit never touches the disk, using an in-memory copy instead that compromises images and containers as well. Reboot the machine, the exploit just loads again. Fun! 💫 https://copy.fail/
To view or add a comment, sign in
-
https://copy.fail/ Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017.
To view or add a comment, sign in
-
Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017. https://copy.fail/
To view or add a comment, sign in
-
Copy Fail Bug- Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017. https://copy.fail/
To view or add a comment, sign in
-
This is CVE-2026-31431. Local user privilege escalation. My understanding is that if you’re on recent Fedora Linux, ensure you’re running kernel 6.19.12 or later. Red Hat Enterprise Linux discussion and mitigation info at https://lnkd.in/gvuZghWA.
Copy Fail Bug- Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017. https://copy.fail/
To view or add a comment, sign in
-
I'm probably late to this party, but Copy Fail (CVE-2026-31431) is the most horrifyingly straightforward and effective root shell compromise I've seen since the 90s. A short python script elevates to root, reliably, for any user. Patch *now*. Make sure to reboot -- or at least read the docs -- if you try the exploit, because it will persist for a time! https://copy.fail #infosec #linux #copyfail
To view or add a comment, sign in
-
Please patch your Linux systems. CVE-2026-31431 - ‚Copy fail‘ is a new Linux kernel zero-day that allows any authenticated user to gain root privileges (Local Privilege Escalation, or LPE) on almost every Linux distribution since 2017. An easy-to-use exploit is already public. https://copy.fail #security #zeroday
Super important for everyone to apply update ASAP. The same 732-byte Python script roots every Linux distribution shipped since 2017. Please PATCH…
To view or add a comment, sign in
-
heads up a nasty Linux kernel vuln just dropped: Copy Fail (CVE-2026-31431). Any regular user can root the box with a tiny Python script. No races, no extra perms, been possible for years on pretty much every major distro. Full details + PoC: https://copy.fail/ Patch your kernels ASAP folks.
To view or add a comment, sign in
-
Another one. CVE-2026-31431 "Copy Fail", a nine-year-old Linux kernel bug, CVSS 7.8, exploitable with a732-byte Python script. No special setup, no race conditions. Root. First try. Schedule that kernel upgrade. And while you're at it: if you're running Kubernetes and still have no runtime security in place, this is a good moment to ask why. I wrote a short post on the vulnerability, the mitigation path, and the tooling options (both free and commercial). Link in the first comment.
To view or add a comment, sign in
More from this author
-
Of AWS's landmark S3 Files, Anthropic's "Mythic" frontier model, Jamie Dimon on platforms, "Pyongyang vs Nebraska" and more.
The Stack 3w -
UK drives hyperscale egress shifts; the Axios incident unpacked; & more!
The Stack 1mo -
Drones scorch AWS data centre as Middle East conflagration deepens
The Stack 2mo
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development