Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Meta cuts contractors who reported seeing Ray-Ban Meta users have sex

    May 1, 2026

    What the Renters' Rights Act means for tenants and landlords

    May 1, 2026

    Strait of Hormuz: A base oils shortage threatens luxury auto giants

    May 1, 2026
    Facebook X (Twitter) Instagram
    Addison Markets
    • Home
    • USA
    • Europe
    • Business
    • Investing
    • Tech
    • Politics
    • Contact Us
    Addison Markets
    Home»Tech»The most severe Linux threat to surface in years catches the world flat-footed
    Tech

    The most severe Linux threat to surface in years catches the world flat-footed

    franperez66q@protonmail.comBy franperez66q@protonmail.comMay 1, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email



    Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe compromises inside data centers and on personal devices.

    The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after privately disclosing it to the Linux kernel security team. The team patched the vulnerability in versions 7.0, 6.19.12, 6.18.12, 6.12.85, 6.6.137, 6.1.170, 5.15.204, and 5.10.254) but few of the Linux distributions had incorporated those fixes at the time the exploit was released.

    A single script hacks all distros

    The critical flaw, tracked as CVE-2026-31431 and the name CopyFail, is a local privilege escalation, a vulnerability class that allows unprivileged users to elevate themselves to administrators. CopyFail is particularly severe because it can be exploited with a single piece of exploit code—released in Wednesday’s disclosure—that works across all vulnerable distributions with no modification. With that, an attacker can, among other things, hack multi-tenant systems, break out of containers based on Kubernetes or other frameworks, and create malicious pull requests that pipe the exploit code through CI/CD work flows.

    “‘Local privilege escalation’ sounds dry, so let me unpack it,” researcher Jorijn Schrijvershof wrote Thursday. “It means: an attacker who already has some way to run code on the machine, even as the most boring unprivileged user, can promote themselves to root. From there they can read every file, install backdoors, watch every process, and pivot to other systems.”

    Schrijvershof added that the same Python script Theori released works reliably for Ubuntu 22.04, Amazon Linux 2023, SUSE 15.6, and Debian 12. The researcher continued:



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    franperez66q@protonmail.com
    • Website

    Related Posts

    Meta cuts contractors who reported seeing Ray-Ban Meta users have sex

    May 1, 2026

    Jim Cramer says the market’s biggest winners all have one thing in common

    May 1, 2026

    Reddit’s CEO calls his company ‘the fuel’ for artificial intelligence

    May 1, 2026

    Elon Musk’s 7 biggest stumbles on the stand at OpenAI trial

    May 1, 2026

    China’s EV price war turns into AI arms race beyond cheaper cars

    May 1, 2026

    Russia cloaks launch schedule after spaceport falls in Ukraine’s sights

    May 1, 2026
    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Meta cuts contractors who reported seeing Ray-Ban Meta users have sex

    May 1, 2026

    What the Renters' Rights Act means for tenants and landlords

    May 1, 2026

    Strait of Hormuz: A base oils shortage threatens luxury auto giants

    May 1, 2026

    Trump scraps Scotch whisky tariffs ‘in honor’ of King Charles

    May 1, 2026
    © 2026 All right reserved
    • About Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.