CVE-2026-31431. 100% Reliable Linux LPE — no race, no per-distro offsets, page-cache write that bypasses on-disk file-integrity tools and crosses containers. Found by Xint Code.
These are from 2024 (which means your box likely has none of these in 2026), and “the attacker has to trick a user into printing from a malicious printer server on their local network that suddenly appears on their machine” which is quite unlikely for a regular home pc. The attacker would require access to your network which would likely mean they’re inside your house so you have other problems besides privilege escalation.
There are plenty of way to get a local unprivileged shell
For instance, if you are running a old version of cups someone could chain together several vulnerabilities to gain root on your system
https://www.bleepingcomputer.com/news/security/cups-flaws-enable-linux-remote-code-execution-but-theres-a-catch/
Having a MAC like SELinux helps to mitigate this but you still should patch as soon as possible
These are from 2024 (which means your box likely has none of these in 2026), and “the attacker has to trick a user into printing from a malicious printer server on their local network that suddenly appears on their machine” which is quite unlikely for a regular home pc. The attacker would require access to your network which would likely mean they’re inside your house so you have other problems besides privilege escalation.