Value for Value β‘οΈ
Episode Summary
We dig into the Copy Fail vulnerability and test a proof-of-concept against our own box. Plus, Jon Seager, VP of Engineering at Canonical joins us, and we kick off the BSD Challenge!Sponsored By:Jupiter Party Annual Membership: Put your support on automatic with our annual plan, and get one month of membership for free!Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love.Support LINUX UnpluggedLinks:π₯ Gets Sats Quick and Easy with Strikeπ» LINUX Unplugged on Fountain.FMCopy Fail β CVE-2026-31431 β "An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root." β TheoriCopy Fail: 732 Bytes to Root - Xint β "A single 732-byte Python script can edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017." β XintLinux Kernel Bug Explained - Jorijn β "CopyFail is more portable. One script, every distro, no offsets. Dirty Pipe needed kernel β₯ 5.8; Copy Fail covers 2017β2026." β Jorijn"Kubernetes Pod Security Standards (Restricted) and default seccomp do NOT block the syscall used." β JorijnArs: Most Severe Linux Threat in Years β "The most severe Linux threat to surface in years catches the world flat-footed." β Ars TechnicaSysdig: CVE-2026-31431 Analysis β "The flaw was introduced in 2017 via commit 72548b093ee3, which switched AEAD operations to in-place processing." β SysdigCERT-EU AdvisoryUbuntu Security TrackerThe Register: Crypto FlawKernel Patch (reverts 2017 optimization) β "This mostly reverts commit 72548b093ee3 except for the copying of the associated data." β Kernel CommitBuggy Commit: 72548b093ee3 (2017)
