<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy]]></title><description><![CDATA[<p>There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431("copy .fail") is particularly special.</p><p>- It's an LPE (local privilege escalation). Yes, we should take it seriously and never give up the dream. No, you should not rely on non-virtualized containers to provide a true multi-tenant security boundary.</p><p>- Every potential attacker in the world has been able to observe the vulnerability in source code form since mid-2017 (9 years ago).<br /><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=72548b093ee38a6d4f2a19e6ef1948ae05c181f7" rel="nofollow noopener"><span>https://</span><span>git.kernel.org/pub/scm/linux/k</span><span>ernel/git/torvalds/linux.git/commit/?id=72548b093ee38a6d4f2a19e6ef1948ae05c181f7</span></a></p><p>- The vendor was notified of the vulnerability 2026-03-23 (39 days ago), apparently with enough detail to put together a patch in ~3 days.</p><p>- Every potential attacker in the world was informed of the specific vulnerability 30 days ago (2026-03-31 at the latest) when the patch was committed with the header "Reported-by: Taeyang Lee &lt;0wn@ theori. io&gt;" Theori .io advertises both offensive and defensive security information services on their site.<br /><a href="https://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git/commit/?id=a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5" rel="nofollow noopener"><span>https://</span><span>git.kernel.org/pub/scm/linux/k</span><span>ernel/git/herbert/crypto-2.6.git/commit/?id=a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5</span></a></p><p>The researchers:</p><p>- Notified the kernel security team<br />- Observed the patch committed<br />- Waited another 34 days<br />- Published a detailed writeup</p><p>Professionally done, IMO.</p><p>The researchers followed the process outlined on the affected vendor's website. Specifically:<br />"the kernel security team strongly recommends that as a reporter of a potential security issue you DO NOT contact the “linux-distros” mailing list UNTIL...[list that includes some absurdly vague conditions]"<br /><a href="https://docs.kernel.org/process/security-bugs.html" rel="nofollow noopener"><span>https://</span><span>docs.kernel.org/process/securi</span><span>ty-bugs.html</span></a></p><p>To do much more than follow the vendor's preferred disclosure process often amounts to demanding that *your* bug be given special attention and treatment. Which is a thing researchers sometimes do. Naturally it's hard to be objective about one's own finding.</p><p>Assessing and prioritizing bug reports is generally the job of the *vendor's* security team, *not* the researchers. There are exceptions. But to force special handling for your bug is simply to blindly take resources away from all the reports that will lead to the 487 other CVEs that month. And some of those might not be LPEs. They could be wormable remote network holes or virtual machine breakout bugs.</p><p>In this case, the kernel security team appears to have decided that the appropriate response was to let downstream read about it when the patch was committed to source control like everybody else. A CVE was publicly announced 11 days later, for a total of 30 days after being notified.</p><p>There are far worse systems.</p><p>Regardless, that process is theirs to manage. It's between the Linux kernel team and whoever they have made promises to.</p><p>I don't know about you, but I get my Linux for free. Nobody promised me anything.</p><p>* Data from stack .watch/product/linux/linux-kernel/, 14 month average</p>]]></description><link>https://board.circlewithadot.net/topic/aa73df69-aa90-4093-8bcc-80b761467a27/there-are-approximately-488-linux-kernel-cves-per-month-and-not-a-lot-of-reason-to-think-that-cve-2026-31431-copy</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:24:37 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/aa73df69-aa90-4093-8bcc-80b761467a27.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 01 May 2026 19:24:20 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy on Mon, 04 May 2026 02:34:51 GMT]]></title><description><![CDATA[<p><span><a href="/user/tychotithonus%40infosec.exchange">@<span>tychotithonus</span></a></span> They took an LPE and made it into the most talked-about vulnerability of the year.</p><p>I think they understand the disclosure process quite well.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/marshray/statuses/116513970035550503</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/marshray/statuses/116513970035550503</guid><dc:creator><![CDATA[marshray@infosec.exchange]]></dc:creator><pubDate>Mon, 04 May 2026 02:34:51 GMT</pubDate></item><item><title><![CDATA[Reply to There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy on Mon, 04 May 2026 02:06:26 GMT]]></title><description><![CDATA[<p><span><a href="/user/tychotithonus%40infosec.exchange">@<span>tychotithonus</span></a></span> In your view, did the discoverers of the 487 other Linux CVEs that month have such an obligation?</p><p>Or is it just for those who go out of their way to inform the users of the affected systems?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/marshray/statuses/116513858272245504</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/marshray/statuses/116513858272245504</guid><dc:creator><![CDATA[marshray@infosec.exchange]]></dc:creator><pubDate>Mon, 04 May 2026 02:06:26 GMT</pubDate></item><item><title><![CDATA[Reply to There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy on Mon, 04 May 2026 02:06:09 GMT]]></title><description><![CDATA[<p><span><a href="/user/marshray%40infosec.exchange">@<span>marshray</span></a></span> And, I mean, I get the spectrum of response here, and I'm not trying to push this into "responsible disclosure" territory. But what they did is <em>shaped</em> like defender-friendly high-visibility  disclosures, without the <em>substance</em>. It's like they didn't really understand what it's <em>for</em> ... and aped its form with out understanding its essence.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116513857153530683</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116513857153530683</guid><dc:creator><![CDATA[tychotithonus@infosec.exchange]]></dc:creator><pubDate>Mon, 04 May 2026 02:06:09 GMT</pubDate></item><item><title><![CDATA[Reply to There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy on Mon, 04 May 2026 01:57:23 GMT]]></title><description><![CDATA[<p><span><a href="/user/marshray%40infosec.exchange">@<span>marshray</span></a></span> I mean, sure, there's no <em>obligation</em> - no more than there's an obligation for me to return my shopping cart. But I still do it, because I understand that what I do has effects on others.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116513822681004092</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116513822681004092</guid><dc:creator><![CDATA[tychotithonus@infosec.exchange]]></dc:creator><pubDate>Mon, 04 May 2026 01:57:23 GMT</pubDate></item><item><title><![CDATA[Reply to There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy on Mon, 04 May 2026 01:53:57 GMT]]></title><description><![CDATA[<p><span><a href="/user/tychotithonus%40infosec.exchange">@<span>tychotithonus</span></a></span> I just can't see how finding a bug using AI-guided fuzzing techniques obligates a security researcher to include LLM-generated guidance for defenders in their disclosure.</p><p>I think defenders can consult their own chatbots if they wish.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/marshray/statuses/116513809195040803</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/marshray/statuses/116513809195040803</guid><dc:creator><![CDATA[marshray@infosec.exchange]]></dc:creator><pubDate>Mon, 04 May 2026 01:53:57 GMT</pubDate></item><item><title><![CDATA[Reply to There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy on Sun, 03 May 2026 20:40:06 GMT]]></title><description><![CDATA[<p><span><a href="/user/marshray%40infosec.exchange">@<span>marshray</span></a></span> Also, <em>they themselves</em> claim that it is no ordinary vulnerability, and should have stood out - making their failure (to initially leverage their position as even a basic clearinghouse for the rush of people who wouldn't find out about it until later) even more questionable.</p><p>Again, it's a weird hybrid of "this is really important" with no understanding of how defenders actually operate.</p><p>And for all of their claimed AI acumen, they didn't even bother to prompt for what defenders would need to know (until well after the announcement, where it's clear that they scrambled to fill in some gaps). </p><p><a href="https://infosec.exchange/tags/CopyFail" rel="tag">#<span>CopyFail</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/512/565/752/461/439/original/3e20b5b362209a80.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116512575091069174</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116512575091069174</guid><dc:creator><![CDATA[tychotithonus@infosec.exchange]]></dc:creator><pubDate>Sun, 03 May 2026 20:40:06 GMT</pubDate></item><item><title><![CDATA[Reply to There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431(&quot;copy on Sun, 03 May 2026 20:33:28 GMT]]></title><description><![CDATA[<p><span><a href="/user/marshray%40infosec.exchange">@<span>marshray</span></a></span> I'm following this for the most part, but what I don't understand is why they thought they needed to stand up an entire domain name and website and coordination point, and then ... do almost nothing with it [initially, and for a couple days after].</p><p>Either they thought it was important enough to do that, and they therefore have a corresponding obligation to at least minimally coordinate and inform defenders (which is what many named vulnerabilities have done in the past), or ... it wasn't. They've chosen some weird middle ground, and even if it was only for marketing reasons, it sure doesn't make me want to buy their product, because I don't trust them to have the judgment or good taste to understand the implications of what they're choosing to do.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116512548994172305</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/tychotithonus/statuses/116512548994172305</guid><dc:creator><![CDATA[tychotithonus@infosec.exchange]]></dc:creator><pubDate>Sun, 03 May 2026 20:33:28 GMT</pubDate></item></channel></rss>