mlfh.org lemmy
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
not_IO@lemmy.blahaj.zone to Linux@programming.devEnglish ·
edit-2
3 days ago

The same 732-byte Python script roots every Linux distribution shipped since 2017

copy.fail

external-link
message-square
29
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
165
external-link

The same 732-byte Python script roots every Linux distribution shipped since 2017

copy.fail

not_IO@lemmy.blahaj.zone to Linux@programming.devEnglish ·
edit-2
3 days ago
message-square
29
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
Copy Fail — 732 Bytes to Root
copy.fail
external-link
CVE-2026-31431. 100% Reliable Linux LPE — no race, no per-distro offsets, page-cache write that bypasses on-disk file-integrity tools and crosses containers. Found by Xint Code.

woaw

also a good blog post about it https://xint.io/blog/copy-fail-linux-distributions

  • superglue@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 days ago

    What I read said the patch was merged into main on April 1st, so they should have.

    • stuner@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      2 days ago

      It looks like the fixes were merged in 6.18, 6.19, and 7.0. But all older (but supported) LTS kernels didn’t have the fix, like 6.12, which is used in Debian 13. And it also seems that Ubuntu, RHEL, and SUSE had not picked up the patches in their kernel versions.

      • Successful_Try543@feddit.org
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        1 day ago

        The kernel 6.12.73-1 used by Debian Trixie is still vulnerable. Applying security updates should update the kernel to 6.12.85-1 and fix the issue.

        https://security-tracker.debian.org/tracker/CVE-2026-31431

        Edit: Kernel 6.1.170-1 just got released and fixes the vulnerability.

    • lengau@midwest.social
      link
      fedilink
      arrow-up
      4
      ·
      2 days ago

      This thread gives a good rundown of what happened: https://infosec.exchange/@wdormann/116489443704631952

Linux@programming.dev

linux@programming.dev

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

  • [email protected]
  • [email protected]
  • our Matrix group chat
  • [email protected]

Original icon base courtesy of [email protected] and The GIMP

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 532 users / day
  • 2.55K users / week
  • 3.61K users / month
  • 3.66K users / 6 months
  • 1 local subscriber
  • 13.5K subscribers
  • 313 Posts
  • 1.77K Comments
  • Modlog
  • mods:
  • Ategon@programming.dev
  • adr1an@programming.dev
  • dwraf_of_ignorance@programming.dev
  • BE: 0.19.17
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org