Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

Scheduled Pinned Locked Moved Uncategorized
copyfailcve202631431
7 Posts 7 Posters 4 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tychotithonus@infosec.exchangeT This user is from outside of this forum
    tychotithonus@infosec.exchangeT This user is from outside of this forum
    tychotithonus@infosec.exchange
    wrote last edited by
    #1

    The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

    Mitigations were extremely thin at launch, and haven't improved much, and are even brittle and misleading:

    Royce Williams (@tychotithonus@infosec.exchange)

    The CopyFail folks shouldn't have routed stderr to /dev/null in their workaround guidance. For some platforms, where it's not a module ... that mitigation is a no-op: ``` $ rmmod algif_aead rmmod: ERROR: Module algif_aead is builtin. ``` So if there's no kernel patch available yet, you can't use that workaround. Instead, use AppArmor / seccomp / SELinux to block unprivileged AF_ALG socket creation if you can (but don't just turn these hardening layers up if they''re not already in place - they can be tricky) #CopyFail #CVE_2026_31431

    favicon

    Infosec Exchange (infosec.exchange)

    They've also largely neglected most of the value of the feedback they're getting from defenders clamoring for useful intel. The GitHub repo is full of feedback about which distros are affected or unaffected ... and a day later, none of it has been used to update the list of affected versions in the main README (except for the RHEL made-up version fix)

    And this exchange is painful:

    Link Preview Image
    RHEL 14.3 does not exist · Issue #12 · theori-io/copy-fail-CVE-2026-31431

    https://access.redhat.com/articles/red-hat-enterprise-linux-release-dates lists RHEL 10.1 as the latest release. kernel is 6.12.0-124.8.1.el10_1 Exploit seems to work (even with 6.12.0-124.52.1.el10_1)

    favicon

    GitHub (github.com)

    "None of us are RH people so it wasn't caught" 😐 You had weeks do basic vetting, or find someone who would help you.

    Theori seems to have to have intended this to be a showcase for their product. Instead, it has convinced me that I will never buy anything from them.

    Edit: Will Dorman goes into more detail here, 100% agreed:
    https://infosec.exchange/@wdormann/116493725294723695

    #CopyFail #cve_2026_31431

    cr0w@infosec.exchangeC h2onolan@infosec.exchangeH scottwilson@infosec.exchangeS meriksson@swecyb.comM 4 Replies Last reply
    1
    0
    • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

      The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

      Mitigations were extremely thin at launch, and haven't improved much, and are even brittle and misleading:

      Royce Williams (@tychotithonus@infosec.exchange)

      The CopyFail folks shouldn't have routed stderr to /dev/null in their workaround guidance. For some platforms, where it's not a module ... that mitigation is a no-op: ``` $ rmmod algif_aead rmmod: ERROR: Module algif_aead is builtin. ``` So if there's no kernel patch available yet, you can't use that workaround. Instead, use AppArmor / seccomp / SELinux to block unprivileged AF_ALG socket creation if you can (but don't just turn these hardening layers up if they''re not already in place - they can be tricky) #CopyFail #CVE_2026_31431

      favicon

      Infosec Exchange (infosec.exchange)

      They've also largely neglected most of the value of the feedback they're getting from defenders clamoring for useful intel. The GitHub repo is full of feedback about which distros are affected or unaffected ... and a day later, none of it has been used to update the list of affected versions in the main README (except for the RHEL made-up version fix)

      And this exchange is painful:

      Link Preview Image
      RHEL 14.3 does not exist · Issue #12 · theori-io/copy-fail-CVE-2026-31431

      https://access.redhat.com/articles/red-hat-enterprise-linux-release-dates lists RHEL 10.1 as the latest release. kernel is 6.12.0-124.8.1.el10_1 Exploit seems to work (even with 6.12.0-124.52.1.el10_1)

      favicon

      GitHub (github.com)

      "None of us are RH people so it wasn't caught" 😐 You had weeks do basic vetting, or find someone who would help you.

      Theori seems to have to have intended this to be a showcase for their product. Instead, it has convinced me that I will never buy anything from them.

      Edit: Will Dorman goes into more detail here, 100% agreed:
      https://infosec.exchange/@wdormann/116493725294723695

      #CopyFail #cve_2026_31431

      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchange
      wrote last edited by
      #2

      @tychotithonus If a random shitposter dropped this then I would understand not having the resources to research and follow up on it. But a startup trying to make a name for itself? It comes across as they got lucky, spent all their time and LLM tokens on hype, and then accidentally proved they don't actually know what they're doing.

      I'm all for the disclosure of it, but the theatrics are more of the same overpromise / underdeliver that we've grown so tired of in this field.

      1 Reply Last reply
      0
      • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

        The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

        Mitigations were extremely thin at launch, and haven't improved much, and are even brittle and misleading:

        Royce Williams (@tychotithonus@infosec.exchange)

        The CopyFail folks shouldn't have routed stderr to /dev/null in their workaround guidance. For some platforms, where it's not a module ... that mitigation is a no-op: ``` $ rmmod algif_aead rmmod: ERROR: Module algif_aead is builtin. ``` So if there's no kernel patch available yet, you can't use that workaround. Instead, use AppArmor / seccomp / SELinux to block unprivileged AF_ALG socket creation if you can (but don't just turn these hardening layers up if they''re not already in place - they can be tricky) #CopyFail #CVE_2026_31431

        favicon

        Infosec Exchange (infosec.exchange)

        They've also largely neglected most of the value of the feedback they're getting from defenders clamoring for useful intel. The GitHub repo is full of feedback about which distros are affected or unaffected ... and a day later, none of it has been used to update the list of affected versions in the main README (except for the RHEL made-up version fix)

        And this exchange is painful:

        Link Preview Image
        RHEL 14.3 does not exist · Issue #12 · theori-io/copy-fail-CVE-2026-31431

        https://access.redhat.com/articles/red-hat-enterprise-linux-release-dates lists RHEL 10.1 as the latest release. kernel is 6.12.0-124.8.1.el10_1 Exploit seems to work (even with 6.12.0-124.52.1.el10_1)

        favicon

        GitHub (github.com)

        "None of us are RH people so it wasn't caught" 😐 You had weeks do basic vetting, or find someone who would help you.

        Theori seems to have to have intended this to be a showcase for their product. Instead, it has convinced me that I will never buy anything from them.

        Edit: Will Dorman goes into more detail here, 100% agreed:
        https://infosec.exchange/@wdormann/116493725294723695

        #CopyFail #cve_2026_31431

        h2onolan@infosec.exchangeH This user is from outside of this forum
        h2onolan@infosec.exchangeH This user is from outside of this forum
        h2onolan@infosec.exchange
        wrote last edited by
        #3

        @tychotithonus there should be a playbook in the IR plan for “we found an exciting bug, now what?”

        badsamurai@infosec.exchangeB 1 Reply Last reply
        0
        • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

          The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

          Mitigations were extremely thin at launch, and haven't improved much, and are even brittle and misleading:

          Royce Williams (@tychotithonus@infosec.exchange)

          The CopyFail folks shouldn't have routed stderr to /dev/null in their workaround guidance. For some platforms, where it's not a module ... that mitigation is a no-op: ``` $ rmmod algif_aead rmmod: ERROR: Module algif_aead is builtin. ``` So if there's no kernel patch available yet, you can't use that workaround. Instead, use AppArmor / seccomp / SELinux to block unprivileged AF_ALG socket creation if you can (but don't just turn these hardening layers up if they''re not already in place - they can be tricky) #CopyFail #CVE_2026_31431

          favicon

          Infosec Exchange (infosec.exchange)

          They've also largely neglected most of the value of the feedback they're getting from defenders clamoring for useful intel. The GitHub repo is full of feedback about which distros are affected or unaffected ... and a day later, none of it has been used to update the list of affected versions in the main README (except for the RHEL made-up version fix)

          And this exchange is painful:

          Link Preview Image
          RHEL 14.3 does not exist · Issue #12 · theori-io/copy-fail-CVE-2026-31431

          https://access.redhat.com/articles/red-hat-enterprise-linux-release-dates lists RHEL 10.1 as the latest release. kernel is 6.12.0-124.8.1.el10_1 Exploit seems to work (even with 6.12.0-124.52.1.el10_1)

          favicon

          GitHub (github.com)

          "None of us are RH people so it wasn't caught" 😐 You had weeks do basic vetting, or find someone who would help you.

          Theori seems to have to have intended this to be a showcase for their product. Instead, it has convinced me that I will never buy anything from them.

          Edit: Will Dorman goes into more detail here, 100% agreed:
          https://infosec.exchange/@wdormann/116493725294723695

          #CopyFail #cve_2026_31431

          scottwilson@infosec.exchangeS This user is from outside of this forum
          scottwilson@infosec.exchangeS This user is from outside of this forum
          scottwilson@infosec.exchange
          wrote last edited by
          #4

          @tychotithonus Well said, all around. It seems like a loosey-goosey disclosure, with the highest emphasis on branding and generating hype.

          1 Reply Last reply
          0
          • tychotithonus@infosec.exchangeT tychotithonus@infosec.exchange

            The CopyFail announcement and handling is one of the least defender-supporting I think I've ever seen.

            Mitigations were extremely thin at launch, and haven't improved much, and are even brittle and misleading:

            Royce Williams (@tychotithonus@infosec.exchange)

            The CopyFail folks shouldn't have routed stderr to /dev/null in their workaround guidance. For some platforms, where it's not a module ... that mitigation is a no-op: ``` $ rmmod algif_aead rmmod: ERROR: Module algif_aead is builtin. ``` So if there's no kernel patch available yet, you can't use that workaround. Instead, use AppArmor / seccomp / SELinux to block unprivileged AF_ALG socket creation if you can (but don't just turn these hardening layers up if they''re not already in place - they can be tricky) #CopyFail #CVE_2026_31431

            favicon

            Infosec Exchange (infosec.exchange)

            They've also largely neglected most of the value of the feedback they're getting from defenders clamoring for useful intel. The GitHub repo is full of feedback about which distros are affected or unaffected ... and a day later, none of it has been used to update the list of affected versions in the main README (except for the RHEL made-up version fix)

            And this exchange is painful:

            Link Preview Image
            RHEL 14.3 does not exist · Issue #12 · theori-io/copy-fail-CVE-2026-31431

            https://access.redhat.com/articles/red-hat-enterprise-linux-release-dates lists RHEL 10.1 as the latest release. kernel is 6.12.0-124.8.1.el10_1 Exploit seems to work (even with 6.12.0-124.52.1.el10_1)

            favicon

            GitHub (github.com)

            "None of us are RH people so it wasn't caught" 😐 You had weeks do basic vetting, or find someone who would help you.

            Theori seems to have to have intended this to be a showcase for their product. Instead, it has convinced me that I will never buy anything from them.

            Edit: Will Dorman goes into more detail here, 100% agreed:
            https://infosec.exchange/@wdormann/116493725294723695

            #CopyFail #cve_2026_31431

            meriksson@swecyb.comM This user is from outside of this forum
            meriksson@swecyb.comM This user is from outside of this forum
            meriksson@swecyb.com
            wrote last edited by
            #5

            @tychotithonus agree, I mean this thing is everywhere. For example i think checkpoint firewalls are even RHEL…

            Alot of scenarios of exploatation is unlikely but I think we will see attack chains coming weeks where this plays a crucial role in successful compromise.

            1 Reply Last reply
            0
            • h2onolan@infosec.exchangeH h2onolan@infosec.exchange

              @tychotithonus there should be a playbook in the IR plan for “we found an exciting bug, now what?”

              badsamurai@infosec.exchangeB This user is from outside of this forum
              badsamurai@infosec.exchangeB This user is from outside of this forum
              badsamurai@infosec.exchange
              wrote last edited by
              #6

              @h2onolan @tychotithonus

              1. Find vuln
              2. Buy .fail domain
              3. Bask in admiration and VC $

              Theori you need to figure out if you’re selling skateboards or doing real infosec.

              #copyfail

              gary_alderson@infosec.exchangeG 1 Reply Last reply
              0
              • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

                @h2onolan @tychotithonus

                1. Find vuln
                2. Buy .fail domain
                3. Bask in admiration and VC $

                Theori you need to figure out if you’re selling skateboards or doing real infosec.

                #copyfail

                gary_alderson@infosec.exchangeG This user is from outside of this forum
                gary_alderson@infosec.exchangeG This user is from outside of this forum
                gary_alderson@infosec.exchange
                wrote last edited by
                #7

                @badsamurai @h2onolan @tychotithonus he may have brought drone doctrine to infosec but can he repeat to make it a pseudo biz model #rev3 #.fail #greg #italy #one trick pony

                1 Reply Last reply
                0
                • R relay@relay.infosec.exchange shared this topic
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups