Lemmy
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
not_IO@lemmy.blahaj.zone to Linux@programming.devEnglish ·
edit-2
2 days ago

The same 732-byte Python script roots every Linux distribution shipped since 2017

copy.fail

external-link
message-square
29
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
161
external-link

The same 732-byte Python script roots every Linux distribution shipped since 2017

copy.fail

not_IO@lemmy.blahaj.zone to Linux@programming.devEnglish ·
edit-2
2 days ago
message-square
29
link
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
Copy Fail — 732 Bytes to Root
copy.fail
external-link
CVE-2026-31431. 100% Reliable Linux LPE — no race, no per-distro offsets, page-cache write that bypasses on-disk file-integrity tools and crosses containers. Found by Xint Code.

woaw

also a good blog post about it https://xint.io/blog/copy-fail-linux-distributions

  • stuner@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    2 days ago

    It seems that most LTS distros didn’t get a heads up and there are no patches available. Uh oh.

    • woelkchen@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      20 hours ago

      Automated test suites became so good, many regular people can just use rolling release distros these days.

      • stuner@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        16 hours ago

        That may be true for personal computers, but the impact of this vulnerability is mainly on servers. And those typically run distros like Debian, Ubuntu, RHEL that didn’t have a patch at that time.

        • woelkchen@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          15 hours ago

          the impact of this vulnerability is mainly on servers

          The impact is any Linux install without root access for its users.

          • dgdft@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 hours ago

            Sure, but it’s much easier to get some form of RCE on public hosts in order to make practical use of the LPE.

    • superglue@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      What I read said the patch was merged into main on April 1st, so they should have.

      • stuner@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        16 hours ago

        It looks like the fixes were merged in 6.18, 6.19, and 7.0. But all older (but supported) LTS kernels didn’t have the fix, like 6.12, which is used in Debian 13. And it also seems that Ubuntu, RHEL, and SUSE had not picked up the patches in their kernel versions.

        • Successful_Try543@feddit.org
          link
          fedilink
          arrow-up
          4
          ·
          15 hours ago

          The kernel 6.12.73-1 used by Debian Trixie is still vulnerable. Applying security updates should update the kernel to 6.12.85-1 and fix the issue.

          https://security-tracker.debian.org/tracker/CVE-2026-31431

      • lengau@midwest.social
        link
        fedilink
        arrow-up
        4
        ·
        21 hours ago

        This thread gives a good rundown of what happened: https://infosec.exchange/@wdormann/116489443704631952

Linux@programming.dev

linux@programming.dev

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

  • [email protected]
  • [email protected]
  • our Matrix group chat
  • [email protected]

Original icon base courtesy of [email protected] and The GIMP

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 492 users / day
  • 2.3K users / week
  • 3.08K users / month
  • 3.12K users / 6 months
  • 1 local subscriber
  • 13.5K subscribers
  • 254 Posts
  • 1.29K Comments
  • Modlog
  • mods:
  • Ategon@programming.dev
  • adr1an@programming.dev
  • dwraf_of_ignorance@programming.dev
  • BE: 0.19.17
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org