17:56:08 lol lmao divisors thing 19:39:46 PSA: UPDATE OR PATCH YOUR LINUX KERNEL IMMEDIATELY: copy.fail 19:41:20 For those who want a link: https://news.ycombinator.com/item?id=47952181 :) 19:41:37 i literaly gave the most official link there is wtf 19:41:53 Oh, sorry, doesn't show on my end 19:41:58 Maybe monero.social is being slow 19:42:12 https://mrelay.p2pool.observer/m/matrix.org/UPxGHdcXzZCzDgJdMcptwWyh.png (clipboard.png) 19:42:20 its just after "IMMEDIATELY:" its copy.fail 19:42:21 @syntheticbird: the article looks AI generated tho 19:42:32 @basses:matrix.org: AI found it 19:42:35 PoC work 19:42:35 @jpk68:matrix.org: didn't include https, so no preview 19:42:47 @syntheticbird: Lmao, I'm stupid 19:42:50 Sorry about that 19:42:56 @jpk68:matrix.org: all good 19:43:26 @syntheticbird: so that excuses writing the article also using AI 19:44:04 @basses:matrix.org: bro why are you complaining you literally posted this in redox random 19:44:10 I learned that from you 19:44:12 thx btw 19:46:11 tldr, it is indeed a CVE patched in kernel, I just didn't like they used AI to write about their AI tool that found this CVE. > <@syntheticbird> PoC work 19:47:34 fixed in kernel 6.19.12 19:48:10 I see no link at all from your end > <@syntheticbird> i literaly gave the most official link there is wtf 19:48:11 @basses:matrix.org: of course, these monkeys can't patch the lts version too 19:48:36 @ixr3:matrix.org: the link is copy.fail but i forgot to put an scheme at the beginning so here we go: https://copy.fail 19:50:32 The webpage mentions a version of RHEL that doesn't even exist 19:51:01 very true 19:52:44 https://ubuntu.com/security/CVE-2026-31431 says that most Ubuntu distros are not affected 19:52:50 Only a few are marked as vulnerable 19:53:28 I can confirm Arch Linux is vulnerable 19:53:44 > AI-assisted. The starting insight — that splice() hands page-cache pages into the crypto subsystem and that scatterlist page provenance might be an under-explored bug class — came from human research by Taeyang Lee at Xint. 19:53:44 > From there, Xint Code scaled the audit across the entire crypto/ subsystem in roughly an hour. Copy Fail was the highest-severity finding in the run. 19:54:10 <321bob321> Lucky core uses 17.04 19:54:19 The latest Arch kernel version is patched, though 19:55:29 @321bob321: lmao