


R4DI 4RT
10.4K posts

@R4DI4RT
Gamer, Artist, Pal. Youtube: https://t.co/45AAk4UaCv All links: https://t.co/qMlpSFls2x GG


























A newly discovered security vulnerability known as Copy Fail, or CVE-2026-31431, has been disclosed in the Linux kernel. It affects virtually every major Linux distribution released since 2017. The flaw sits in the kernel’s cryptographic subsystem and stems from a logic error introduced back in 2017: >It allows any local user without special privileges to escalate directly to root. >The exploit is unusually simple: a short Python script can reliably achieve this by modifying data only in the system’s memory cache rather than on disk. >In practice, an attacker can target any readable file, such as a setuid-root binary like sudo or su, and alter it only in RAM. >The change is invisible to file integrity monitors and leaves no trace on the hard drive. >The same technique also works from inside containers, potentially allowing an escape from Docker, Kubernetes, or similar environments to compromise the host server. >This makes Copy Fail both stealthy and highly portable across systems. Patches have already begun rolling out from major distributors. System administrators should apply the latest kernel updates and reboot as soon as possible.
























