Get all your news in one place.
100's of premium titles.
One app.
Start reading
PC Gamer
PC Gamer
Jess Kinghorn

'A single 732-byte Python script can be used to obtain root on essentially all Linux distributions shipped since 2017': Time to update your kernel

A view of a gentoo (Pygoscelis papua) penguin at the Paradise Bay in the Gerlache Strait -which separates the Palmer Archipelago from the Antarctic Peninsula, on January 20, 2024. Scientists and researchers from various countries are collaborating on projects during the X Antarctic Expedition aboard the Colombian research vessel 'ARC Simon Bolivar,' designed exclusively to develop scientific projects. These initiatives involve analyzing the current condition of the Antarctic sea, studying atmospheric pressure, and monitoring the species inhabiting this region of the planet. .

Gaming on Linux has never been better—but that doesn't mean your distros are free from security threats. Case in point is a severe vulnerability nicknamed 'Copy Fail,' which allows a local user to dig into the guts of the OS and give themselves root privileges merely by writing four bytes of controlled data into the page cache of any readable file.

The security research team at Theori disclosed the vulnerability last Wednesday, though CISA reports that threat actors have since been observed using the exploit in the wild. The security flaw has been given the designation CVE-2026-31431 and marked with a high severity score of 7.8 (via Bleeping Computer).

This is because Copy Fail could potentially leave a large number of Linux users exposed—if you've not updated your kernel in a hot minute, now would be the time. Theori puts it succinctly in its write-up, summarising, "A single 732-byte Python script can [be used to] obtain root on essentially all Linux distributions shipped since 2017."

As such, CISA added the vulnerability to its Known Exploited Vulnerabilities Catalog. In accordance with 'Binding Operational Directive (BOD) 22-01', this move in turn requires Federal Civilian Executive Branch agencies based throughout the USA to update their systems by May 15 in order to protect their systems against this active threat.

CISA warns, "This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise."

(Image credit: Ubuntu)

Cybersecurity firm Theori also offers a more digestible Copy Fail guide. This includes the security research team's original Proof of Concept script so "defenders can verify their own systems and validate vendor patches." It's worth clarifying that this script requires local access to a machine running Linux, and that the security vulnerability is not an example of remote code execution.

The team found the same script works in Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, and SUSE 16, but obviously, plenty of other Linux distros are also affected.

This news follows claims made last week by Canonical—the company that created Ubuntu—that its web infrastructure was under a "sustained, cross-border attack". Though the Copy Fail vulnerability was disclosed by Theori around the same time, the exploit may not be to blame. Canonical has yet to provide an update after its X post on May 1st.

Sign up to read this article
Read news from 100's of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.