Damus
FLASH profile picture
FLASH
@flash
⚡🚨 NEW - A newly discovered security vulnerability known as Copy Fail, or CVE-2026-31431, has been disclosed in the Linux kernel.

It affects virtually every major Linux distribution released since 2017.

The flaw sits in the kernel’s cryptographic subsystem and stems from a logic error introduced back in 2017:

- It allows any local user without special privileges to escalate directly to root.

- The exploit is unusually simple: a short Python script can reliably achieve this by modifying data only in the system’s memory cache rather than on disk.

- In practice, an attacker can target any readable file, such as a setuid-root binary like sudo or su, and alter it only in RAM.

- The change is invisible to file integrity monitors and leaves no trace on the hard drive.

- The same technique also works from inside containers, potentially allowing an escape from Docker, Kubernetes, or similar environments to compromise the host server.

- This makes Copy Fail both stealthy and highly portable across systems.

Patches have already begun rolling out from major distributors. System administrators should apply the latest kernel updates and reboot as soon as possible.
818❤️16🤙3👀1😮1😱1
FLASH · 1w
🗞 https://www.bugcrowd.com/blog/what-we-know-about-copy-fail-cve-2026-31431/
stl1988 · 1w
Why not letting Claude Mythos fix it?
JackTheMimic · 1w
With Microsoft shitting the bed so hard with Windows, it's no wonder that we're seeing more discovered exploits on Linux. Now we get to test how resilient this open source kernel really is.
divnt · 1w
GrapheneOS unaffected https://discuss.grapheneos.org/d/35110-grapheneos-is-protected-against-copy-fail-and-similar-vulnerabilities-by-selinux
Hazey · 1w
Fuuuuuuck
cryptic node · 1w
Also the hacker needs to be physically on the machine theoretically. Unless a user unwittingly installs an infected python script? Amirite?
hasky · 1w
Oh wow who figure that vulnerability mythos? ☺️