Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Yes, you should probably be nicer to your AI — here’s why that’s not as ridiculous as it sounds

Yes, you should probably be nicer to your AI — here’s why that’s not as ridiculous as it sounds

3 May 2026
Skullcandy Discount Code: 30% Off | May 2026

Skullcandy Discount Code: 30% Off | May 2026

3 May 2026
Window’s Secure Boot certificates are expiring in June — here’s what you need to do

Window’s Secure Boot certificates are expiring in June — here’s what you need to do

3 May 2026
Limited Time: TurboTax Full Service Coupons This May

Limited Time: TurboTax Full Service Coupons This May

3 May 2026
LG’s latest decadent gaming monitor is a 45-inch OLED beauty that pushes 330Hz at 5K

LG’s latest decadent gaming monitor is a 45-inch OLED beauty that pushes 330Hz at 5K

3 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers
Tech News

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers

By technologistmag.com1 May 20263 Mins Read
Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers
Share
Facebook Twitter Reddit Telegram Pinterest Email

Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe compromises inside data centers and on personal devices.

The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after privately disclosing it to the Linux kernel security team. The team patched the vulnerability in versions 7.0, 6.19.12, 6.18.12, 6.12.85, 6.6.137, 6.1.170, 5.15.204, and 5.10.254) but few of the Linux distributions had incorporated those fixes at the time the exploit was released.

A Single Script to Hack Them All

The critical flaw, tracked as CVE-2026-31431 and the name CopyFail, is a local privilege escalation, a vulnerability class that allows unprivileged users to elevate themselves to administrators. CopyFail is particularly severe because it can be exploited with a single piece of exploit code—released in Wednesday’s disclosure—that works across all vulnerable distributions with no modification. With that, an attacker can, among other things, hack multi-tenant systems, break out of containers based on Kubernetes or other frameworks, and create malicious pull requests that pipe the exploit code through CI/CD work flows.

“‘Local privilege escalation’ sounds dry, so let me unpack it,” researcher Jorijn Schrijvershof wrote Thursday. “It means: An attacker who already has some way to run code on the machine, even as the most boring unprivileged user, can promote themselves to root. From there they can read every file, install backdoors, watch every process, and pivot to other systems.”

Schrijvershof added that the same Python script Theori released works reliably for Ubuntu 22.04, Amazon Linux 2023, SUSE 15.6, and Debian 12. The researcher continued:

Why does that matter on shared infrastructure? Because “local” covers a lot of ground in 2026: every container on a shared Kubernetes node, every tenant on a shared hosting box, every CI/CD job that runs untrusted pull-request code, every WSL2 instance on a Windows laptop, every containerised AI agent given shell access. They all share one Linux kernel with their neighbors. A kernel LPE collapses that boundary.

The realistic threat chain looks like this. An attacker exploits a known WordPress plugin vulnerability and gets shell access as www-data. They run the copy.fail PoC. They are now root on the host. Every other tenant is suddenly reachable, in the way I walked through in this hack post-mortem. The vulnerability does not get the attacker onto the box; it changes what happens in the next ten seconds after they land there.

The vulnerability stems from a “straight-line” logic flaw in the kernel’s crypto API. Many exploits exploiting race conditions and memory corruption flaws don’t consistently succeed across kernel versions or distributions, and sometimes even on the same machine. Because the code released for CopyFail exploits a logic flaw, “reliability isn’t probabilistic, and the same script works across distributions, researchers from Bugcrowd wrote. “No race window, no kernel offset.”

CopyFail gets its name because the authencesn AEAD template process (used for IPsec extended sequence numbers) doesn’t actually copy data when it should. Instead, it “uses the caller’s destination buffer as a scratch pad, scribbles 4 bytes past the legitimate output region, and never restores them,” Theori said. “The ‘copy’ of the AAD ESN bytes ‘fails’ to stay inside the destination buffer.”

The Worst Linux Vulnerability in Years

Other security experts echoed the perspective that CopyFail poses a serious threat, with one saying it’s the “worst make-me-root vulnerabilities in the kernel in recent times.”

The most recent such Linux vulnerability was Dirty Pipe from 2022 and Dirty Cow in 2016. Both of those vulnerabilities were actively exploited in the wild.

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleYou can now check a product’s price history spanning a whole year on Amazon
Next Article The Video Games You Should Play This Weekend – May 1

Related Articles

Yes, you should probably be nicer to your AI — here’s why that’s not as ridiculous as it sounds

Yes, you should probably be nicer to your AI — here’s why that’s not as ridiculous as it sounds

3 May 2026
Skullcandy Discount Code: 30% Off | May 2026

Skullcandy Discount Code: 30% Off | May 2026

3 May 2026
Window’s Secure Boot certificates are expiring in June — here’s what you need to do

Window’s Secure Boot certificates are expiring in June — here’s what you need to do

3 May 2026
Limited Time: TurboTax Full Service Coupons This May

Limited Time: TurboTax Full Service Coupons This May

3 May 2026
LG’s latest decadent gaming monitor is a 45-inch OLED beauty that pushes 330Hz at 5K

LG’s latest decadent gaming monitor is a 45-inch OLED beauty that pushes 330Hz at 5K

3 May 2026
Shark Promo Code: 0 Off | This May

Shark Promo Code: $100 Off | This May

3 May 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Skullcandy Discount Code: 30% Off | May 2026

Skullcandy Discount Code: 30% Off | May 2026

By technologistmag.com3 May 2026

Skullcandy headphones aren’t always the sharpest tools in the proverbial shed, but they do have…

Window’s Secure Boot certificates are expiring in June — here’s what you need to do

Window’s Secure Boot certificates are expiring in June — here’s what you need to do

3 May 2026
Limited Time: TurboTax Full Service Coupons This May

Limited Time: TurboTax Full Service Coupons This May

3 May 2026
LG’s latest decadent gaming monitor is a 45-inch OLED beauty that pushes 330Hz at 5K

LG’s latest decadent gaming monitor is a 45-inch OLED beauty that pushes 330Hz at 5K

3 May 2026
Shark Promo Code: 0 Off | This May

Shark Promo Code: $100 Off | This May

3 May 2026
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2026 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.