[kwlug-disc] Copy-Fail CVE-2026-31431
William Park
opengeometry at yahoo.ca
Sat May 2 00:40:43 EDT 2026
Thanks. FYI, the fixed kernels are
* 6.12.85+ -- Raspberry Pi, and most Debian 13 systems
* 6.18.22+ -- most LTS
* 7.0+ -- I'm using 7.0.3 (CachyOS), so I'm OK.
On 2026-04-30 21:17, Jason wrote:
> Pretty critical kernel exploit that allows local privilege escalation'
>
> https://www.cve.org/CVERecord?id=CVE-2026-31431
>
> Video explanation:
> https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4
>
> Make sure to update your machines , and make sure you're on a patched
> version. Trackers for common distros:
>
> - RedHat https://access.redhat.com/security/cve/cve-2026-31431
> - Debian https://security-tracker.debian.org/tracker/CVE-2026-31431
> - Ubuntu https://ubuntu.com/security/CVE-2026-31431
> - Suse: https://www.suse.com/security/cve/CVE-2026-31431.html
> - Arch: https://security.archlinux.org/CVE-2026-31431
>
> _______________________________________________
> kwlug-disc mailing list
> To unsubscribe, send an email tokwlug-disc-leave at kwlug.org
> with the subject "unsubscribe", or email
> kwlug-disc-owner at kwlug.org to contact a human being.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.kwlug.org/pipermail/kwlug-disc_kwlug.org/attachments/20260502/9bcc925d/attachment.htm>
More information about the kwlug-disc
mailing list