[kwlug-disc] Copy-Fail CVE-2026-31431

William Park opengeometry at yahoo.ca
Sat May 2 00:40:43 EDT 2026


Thanks.  FYI, the fixed kernels are

  * 6.12.85+  -- Raspberry Pi, and most Debian 13 systems
  * 6.18.22+  -- most LTS
  * 7.0+  -- I'm using 7.0.3 (CachyOS), so I'm OK.


On 2026-04-30 21:17, Jason wrote:
> Pretty critical kernel exploit that allows local privilege escalation'
>
> https://www.cve.org/CVERecord?id=CVE-2026-31431
>
> Video explanation: 
> https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4
>
> Make sure to update your machines , and make sure you're on a patched 
> version. Trackers for common distros:
>
> - RedHat https://access.redhat.com/security/cve/cve-2026-31431
> - Debian https://security-tracker.debian.org/tracker/CVE-2026-31431
> - Ubuntu https://ubuntu.com/security/CVE-2026-31431
> - Suse: https://www.suse.com/security/cve/CVE-2026-31431.html
> - Arch: https://security.archlinux.org/CVE-2026-31431
>
> _______________________________________________
> kwlug-disc mailing list
> To unsubscribe, send an email tokwlug-disc-leave at kwlug.org
> with the subject "unsubscribe", or email
> kwlug-disc-owner at kwlug.org to contact a human being.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.kwlug.org/pipermail/kwlug-disc_kwlug.org/attachments/20260502/9bcc925d/attachment.htm>


More information about the kwlug-disc mailing list