Communick News
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
volkerwirsing@feddit.org to Technology@lemmy.worldEnglish · 3 days ago

Copy Fail: 732 Bytes to Root on Every Major Linux Distribution. - Xint

xint.io

external-link
message-square
26
link
fedilink
188
external-link

Copy Fail: 732 Bytes to Root on Every Major Linux Distribution. - Xint

xint.io

volkerwirsing@feddit.org to Technology@lemmy.worldEnglish · 3 days ago
message-square
26
link
fedilink
Xint Code disclosed CVE-2026-31431, an authencesn scratch-write bug chaining AF_ALG + splice() into a 4-byte page cache write. A 732-byte PoC gets root on Ubuntu, Amazon Linux, RHEL, SUSE. | AI for Security, Vulnerability Research
alert-triangle
You must log in or # to comment.
  • Mister_Hangman@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 day ago

    So I’m on Ubuntu 24.04. Is there like a patch I can run to protect myself?

  • whaleross@lemmy.world
    link
    fedilink
    English
    arrow-up
    33
    ·
    3 days ago

    Sooo new root coming to smart home devices?

    • plateee@piefed.social
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 days ago

      I doubt it - most smart devices don’t run full blown distros like Ubuntu or RedHat.

      But some might?

  • corsicanguppy@lemmy.ca
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 days ago

    There’s a sysctl tweak that neuters this sploit. Do it now pending the patch.

  • MadMadBunny@lemmy.ca
    link
    fedilink
    English
    arrow-up
    9
    ·
    3 days ago

    Oh shit they found it

  • palordrolap@fedia.io
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    3 days ago

    There’s a bit at the end of the article that might be counter to the RDP that it talks about, even if it is deliberately vague.

  • Ŝan • 𐑖ƨɤ@piefed.zip
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    39
    ·
    3 days ago

    … every major Linux distribution
    …
    Ubuntu, Amazon Linux, RHEL, SUSE

    ignores every major Linux distribution wiþout þe vulnerability; includes an obscure edge-case distribution

    Arch isn’t a major distribution? And who TF is using Amazon Linux? I’ve never even heard of it before. Does it have even as many deployments as Alpine?

    What a shit, sensationalist, clickbait title.

    • KyuubiNoKitsune@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 days ago

      And who TF is using Amazon Linux?

      This reaks of ignorance.

      Millions of companies use it. I’m pretty sure you unknowingly interact with it every day.

      • Ŝan • 𐑖ƨɤ@piefed.zip
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        5
        ·
        1 day ago

        Amazon Linux has exactly one user. One: AWS. It’s an in-house distribution just for running AWS services. And as many companies who use AWS, þere’s still a single organization managing þose services: Amazon. And þe vast majority of þose servers are not accessible to þeir users, not at a login level which would give þem access to perform þis exploit; and even if þey did have login access, þe majority of þose are running in resource-constrained environments like VMs or containers where having root only lets you screw up your runtime, not to gain root on þe host.

        Meanwhile, Arch has some 1.6M global installs, many of which are unique users. Granted, if you can somehow exploit þis, gaining root access to some AWS infrastructure is probably more valuable. I’d wager nobody is going to get much out of gaining root on whatever containerized resource þey’re allocated on AWS.

        • KyuubiNoKitsune@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 day ago

          I’m sorry, am I supposed to understand what you are þaying?

    • grue@lemmy.world
      link
      fedilink
      English
      arrow-up
      39
      arrow-down
      1
      ·
      3 days ago

      And who TF is using Amazon Linux? I’ve never even heard of it before.

      AWS nodes, maybe?

      Also, shouldn’t you be spelling that “ÞF”?

    • 4am@lemmy.zip
      link
      fedilink
      English
      arrow-up
      33
      ·
      3 days ago

      Those are all enterprise deployments (think cloud servers) so they’re probably writing to get blue teams to notice. Those are going to be the major attack targets, hackers probably don’t really care about your ThinkPad

      • Optional@lemmy.world
        link
        fedilink
        English
        arrow-up
        23
        arrow-down
        1
        ·
        3 days ago

        . . . Another win for the mighty ThinkPad then.

        • 4am@lemmy.zip
          link
          fedilink
          English
          arrow-up
          7
          ·
          3 days ago

          I can’t argue with that

  • subOrange@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    49
    ·
    3 days ago

    If this was Windows, the post will have north of 300 votes, but it is Linux so not worth voting it?

    • mpramann@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      21
      ·
      3 days ago

      It’s being posted all over Lemmy…?

    • fullsquare@awful.systems
      link
      fedilink
      English
      arrow-up
      23
      arrow-down
      3
      ·
      3 days ago

      patched month ago

      • miss phant@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        3 days ago

        No patch on 6.12 LTS and by extension Debian.

        • azvasKvklenko@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          deleted by creator

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        2 days ago

        where exactly? at least a couple hours ago there were no patches yet for any of debian, redhat, suse

        • fullsquare@awful.systems
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 days ago

          https://github.com/torvalds/linux/commit/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5 its in that post

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            ·
            2 days ago

            that commit is misleading. that’s the commit of the researcher to their own branch. it was only merged to mainline mid april.

            https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8

            and even that is only for the upcoming 7.0 release. a couple of hours ago trixie was not fixed here, but since then a fixed kernel package was released: https://security-tracker.debian.org/tracker/CVE-2026-31431
            also check the openwall link there, where they discuss it was not backported to LTS kernels until very recently.

            on suse’s part, there are still no fixes: https://www.suse.com/security/cve/CVE-2026-31431.html

      • subOrange@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        4
        ·
        3 days ago

        Still, my point remains valid.

        • kescusay@lemmy.world
          link
          fedilink
          English
          arrow-up
          8
          ·
          3 days ago

          Windows has an overwhelming market share in PCs. Exploitable vulnerabilities that let hackers own it are going to be huge news for as long as that remains the case, because it directly impacts the lives and personal data of more people.

          That said, I’m seeing lots of people talk about this particular Linux vulnerability, so I’m not even sure what your gripe is.

    • NaibofTabr@infosec.pub
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      2
      ·
      3 days ago

    • nibbler@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      3 days ago

      people are still on windows?

      • Optional@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 days ago

        Wait til you hear about the politics.

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !technology@lemmy.world

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @L4s@lemmy.world
  • @autotldr@lemmings.world
  • @PipedLinkBot@feddit.rocks
  • @wikibot@lemmy.world
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 5.87K users / day
  • 10K users / week
  • 16.4K users / month
  • 30.8K users / 6 months
  • 5 local subscribers
  • 84.3K subscribers
  • 18.9K Posts
  • 784K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • Technopagan@lemmy.world
  • L4sBot@lemmy.world
  • L3s@hackingne.ws
  • BE: 0.19.17
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org