<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I’m a bit surprised they did not wait till a patch was available for the major distros.]]></title><description><![CDATA[<p>I’m a bit surprised they did not wait till a patch was available for the major distros. Smells like an IPO or the next round of funding is coming soon.</p><p>You probably want to keep a close eye on any system you maintain where unprivileged users have shell access and update as soon as possible.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://copy.fail/" title="Copy Fail — 732 Bytes to Root">
<img src="https://copy.fail/og.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://copy.fail/">
Copy Fail — 732 Bytes to Root
</a>
</h5>
<p class="card-text line-clamp-3">Copy Fail (CVE-2026-31431): a 732-byte Linux LPE — straight-line, no race, no per-distro offsets. Same Python script roots Ubuntu, Amazon Linux, RHEL, SUSE since 2017. Page-cache write bypasses on-disk file-integrity tools and crosses container boundaries. Found by Xint Code.</p>
</div>
<a href="https://copy.fail/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://copy.fail/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">Xint <span class="text-secondary">(copy.fail)</span></p>
</a>
</div><p></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">

<div class="card-body">
<h5 class="card-title">
<a href="https://security-tracker.debian.org/tracker/CVE-2026-31431">
CVE-2026-31431
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://security-tracker.debian.org/tracker/CVE-2026-31431" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://security-tracker.debian.org/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(security-tracker.debian.org)</span></p>
</a>
</div><p></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://ubuntu.com/security/CVE-2026-31431" title="CVE-2026-31431 | Ubuntu">
<img src="https://assets.ubuntu.com/v1/47f12466-og_%20ubuntu.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://ubuntu.com/security/CVE-2026-31431">
CVE-2026-31431 | Ubuntu
</a>
</h5>
<p class="card-text line-clamp-3">
        Ubuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things.</p>
</div>
<a href="https://ubuntu.com/security/CVE-2026-31431" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://assets.ubuntu.com/v1/be7e4cc6-COF-favicon-32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />









<p class="d-inline-block text-truncate mb-0">Ubuntu <span class="text-secondary">(ubuntu.com)</span></p>
</a>
</div><p></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.suse.com/security/cve/CVE-2026-31431.html" title="CVE-2026-31431 Common Vulnerabilities and Exposures | SUSE">
<img src="https://www.suse.com/assets/img/suse-social-sharing-image.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.suse.com/security/cve/CVE-2026-31431.html">
CVE-2026-31431 Common Vulnerabilities and Exposures | SUSE
</a>
</h5>
<p class="card-text line-clamp-3">Secure your Linux systems from CVE-2026-31431. Stay ahead of potential threats with the latest security updates from SUSE.</p>
</div>
<a href="https://www.suse.com/security/cve/CVE-2026-31431.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.suse.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.suse.com)</span></p>
</a>
</div><p></p><p><a href="https://toot.kif.rocks/tags/copyfail" rel="tag">#<span>copyfail</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/ca5167c6-bd5a-49f1-aed0-9376d633489a/i-m-a-bit-surprised-they-did-not-wait-till-a-patch-was-available-for-the-major-distros.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 15:51:07 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/ca5167c6-bd5a-49f1-aed0-9376d633489a.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 20:22:15 GMT</pubDate><ttl>60</ttl></channel></rss>