<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I spent the last couple of days examining the source code and understanding the Copy]]></title><description><![CDATA[<p>I spent the last couple of days examining the source code and understanding the Copy.Fail vulnerability in detail. This vulnerability happens on the shoulders of 4 key components:</p><p>- Page cache<br />- AF_ALG<br />- algif_aead<br />- splice()</p><p>In this video, I talk about these components and demonstrate how the CVE-2026-31431 vulnerability allows attackers to gain root access by modifying the “su” entry in the page cache.</p><p><a href="https://youtu.be/OftLQ1uPh4M" rel="nofollow noopener"><span>https://</span><span>youtu.be/OftLQ1uPh4M</span><span></span></a></p><p><a href="https://mastodon.bsd.cafe/tags/copyfail" rel="tag">#<span>copyfail</span></a> <a href="https://mastodon.bsd.cafe/tags/linux" rel="tag">#<span>linux</span></a> <a href="https://mastodon.bsd.cafe/tags/video" rel="tag">#<span>video</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/0da9be4c-cf67-4719-97d4-7f69e439bf74/i-spent-the-last-couple-of-days-examining-the-source-code-and-understanding-the-copy</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 22:34:15 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/0da9be4c-cf67-4719-97d4-7f69e439bf74.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 03 May 2026 01:02:10 GMT</pubDate><ttl>60</ttl></channel></rss>