-
br-m
<diego:cypherstack.com> lol lmao divisors thing
-
br-m
<syntheticbird> PSA: UPDATE OR PATCH YOUR LINUX KERNEL IMMEDIATELY: copy.fail
-
br-m
<jpk68:matrix.org> For those who want a link:
news.ycombinator.com/item?id=47952181 :)
-
br-m
<syntheticbird> i literaly gave the most official link there is wtf
-
br-m
<jpk68:matrix.org> Oh, sorry, doesn't show on my end
-
br-m
<jpk68:matrix.org> Maybe monero.social is being slow
-
br-m
-
br-m
<syntheticbird> its just after "IMMEDIATELY:" its copy.fail
-
br-m
<basses:matrix.org> @syntheticbird: the article looks AI generated tho
-
br-m
<syntheticbird> @basses:matrix.org: AI found it
-
br-m
<syntheticbird> PoC work
-
br-m
<basses:matrix.org> @jpk68:matrix.org: didn't include https, so no preview
-
br-m
<jpk68:matrix.org> @syntheticbird: Lmao, I'm stupid
-
br-m
<jpk68:matrix.org> Sorry about that
-
br-m
<syntheticbird> @jpk68:matrix.org: all good
-
br-m
<basses:matrix.org> @syntheticbird: so that excuses writing the article also using AI
-
br-m
<syntheticbird> @basses:matrix.org: bro why are you complaining you literally posted this in redox random
-
br-m
<syntheticbird> I learned that from you
-
br-m
<syntheticbird> thx btw
-
br-m
<basses:matrix.org> tldr, it is indeed a CVE patched in kernel, I just didn't like they used AI to write about their AI tool that found this CVE. > <@syntheticbird> PoC work
-
br-m
<basses:matrix.org> fixed in kernel 6.19.12
-
br-m
<ixr3:matrix.org> I see no link at all from your end > <@syntheticbird> i literaly gave the most official link there is wtf
-
br-m
<syntheticbird> @basses:matrix.org: of course, these monkeys can't patch the lts version too
-
br-m
<syntheticbird> @ixr3:matrix.org: the link is copy.fail but i forgot to put an scheme at the beginning so here we go:
copy.fail
-
br-m
<jpk68:matrix.org> The webpage mentions a version of RHEL that doesn't even exist
-
br-m
<syntheticbird> very true
-
sech1
ubuntu.com/security/CVE-2026-31431 says that most Ubuntu distros are not affected
-
sech1
Only a few are marked as vulnerable
-
br-m
<syntheticbird> I can confirm Arch Linux is vulnerable
-
br-m
<syntheticbird> > AI-assisted. The starting insight — that splice() hands page-cache pages into the crypto subsystem and that scatterlist page provenance might be an under-explored bug class — came from human research by Taeyang Lee at Xint.
-
br-m
<syntheticbird> > From there, Xint Code scaled the audit across the entire crypto/ subsystem in roughly an hour. Copy Fail was the highest-severity finding in the run.
-
br-m
<321bob321> Lucky core uses 17.04
-
br-m
<jpk68:matrix.org> The latest Arch kernel version is patched, though
-
br-m
<syntheticbird> @321bob321: lmao