{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/","author_name":"Sheida Azimi","author_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/author\/sheida-azimi\/","title":"Copy Fail : anatomie de la faille Linux la plus critique de ces derni\u00e8res ann\u00e9es","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"LnxYDzL7Mx\"><a href=\"https:\/\/unit42.paloaltonetworks.com\/fr\/cve-2026-31431-copy-fail\/\">Copy Fail : anatomie de la faille Linux la plus critique de ces derni\u00e8res ann\u00e9es<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unit42.paloaltonetworks.com\/fr\/cve-2026-31431-copy-fail\/embed\/#?secret=LnxYDzL7Mx\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Copy Fail : anatomie de la faille Linux la plus critique de ces derni\u00e8res ann\u00e9es\u00a0\u00bb &#8212; Unit 42\" data-secret=\"LnxYDzL7Mx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2026\/05\/05_Vulnerabilities_1920x900-2-1.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"Copy Fail (CVE-2026-31431) est une faille critique d\u2019escalade locale des privil\u00e8ges (LPE) dans le noyau Linux, qui permet d\u2019obtenir un acc\u00e8s root furtif. Et cette menace affecte des millions de syst\u00e8mes. Retrouvez notre analyse."}