[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: 1754430358132104.png (105 KB, 406x317)
105 KB PNG
Windows won again today.
>>
File: 1766952092383147.png (781 KB, 850x695)
781 KB PNG
What happened? I'm an eternal Windowschad.
>>
Already patched.

https://almalinux.org/blog/2026-05-01-cve-2026-31431-copy-fail/
>>
>>108754996
A bunch of nothing.
Basically some dumb fuck writing kernel code decided to reuse a buffer instead of a separate one and that allows a regular user to load a setuid binary (like su) into memory, overwrite portions of the copy in memory and then run that copy in memory and then you get root.
>>
>>108755049
>A bunch of nothing.
It was a root exploit (privilege escalation). Linux needs talented programmers and security pros, not mindless cheerleaders. These things occur in every OS, and then it's a question of how quickly they can release a patch.
>>
>>108754992
Wait did MS patch the Windows Defender CVE and the Bluehammer exploit?
>>
claude would never
>>
By the way, this was fixed in upstream quickly and almost every vendor ignored it. Fedora and Arch patched it (I believe). RHEL did not lol, what are they even paid for?
>>
>>108755134
>https://xint.io/blog/copy-fail-linux-distributions
>This finding was AI-assisted
well well
>>
>>108755049
>nsa-inserted backdoor
>nothing
>>
>>108755130
It was patched in April. Still took too long though.
>>
>>108755135
to not fix it
>>
File: 1753204710337476.png (97 KB, 1870x492)
97 KB PNG
>>108754992
windows had this the same day copy fail was released.
>>
>>108755119
And it was patched.
>>
>>108755349
Upstream were quick, the downstream vendors were absolutely slow. I’m sure “commercial” linux has been just as jeeted these days as every other tech company.
>>
>>108755360
well, the person who found it decided to prioritize selling their product over following normal procedures. that was the real issue. there was no communication with distros, at all.
>>
>>108755373
The kernel devs stance on a situation like this has always been to assume that every kernel bug is potentially a security bug, which is why I think distros that only update their shit whenever someone tells them there's a newly discovered exploitable bug is shit and should be avoided.
>>
>>108754992
local user
have access to all data at own pc already
call exploit
since apple or google will fail in locking you out
>>
>>108755139
at what degree tho? asking an llm a question could also be considered "AI-assisted"
>>
>>108754992
>Fireship
kys
>>
>>108755149
Interesting
Can some schizo track the person who originally did that commit and verify if he glows in the dark or not? I would like to know if it was an accident or deliberate
>>
>>108754992
>bytes
a youtuber fit for op to watch
>>
>>108754992
did anyone test the exploit through wsl?
>>
>>108754992
>you can achieve root on a machine where you can run arbitrary code
whoa
>>
>>108754992
What distro
>>
>>108755119
>talented programmers
They are all dead
>>
>>108757255
do it yourself nerd none of use write code or use git
>>
>>108754992
>every machine
But I haven't updated in months
>>
File: HFO2vRUa4AAfWRA.jpg (51 KB, 723x540)
51 KB JPG
>>108754992
>Windows won again today.
Windows has new privilege escalation bugs every day with dozens being exploited in the wild at any given moment. Nobody assumes Windows ever is safe against this type exploit, so none of it ever makes the news. Unlike with Linux where complete security is the assumed default state of matters.
>>
>>108754992

I like this timeline of Windows being the underdog to Linux. Hope MS kicks it into high gear
>>
>>108757240
what level of jeet cope is this
>>
>>108759677
>Unlike with Linux where complete security is the assumed default state of matters.
lol

it's better than windows but no anon.
>>
>>108754992
Linux losers are the worst cess pit and epitome of a life wasted.

Total windows domination
>>
>>108755349
it existed for 7 years, who knows how many got pozzed during that time
>>
>>108757245
you first tourist
>>
>>108754992
I have an old kernel that is affected. I tried to run the exploit and I have the error "OSError: [Errno 97] Address family not supported by protocol". I know that /g/ is not my tech support, but maybe somebody can help me run this exploit? I just want to check that it indeed works.
>>
>>108757535
Actually it's very serious because many of us use some proprietary software (that we can't avoid) isolated as a separate user, thinking that there's no exploit that allows it to get root.
>>
>>108764304
you already proved it doesn't work retard
>>
File: CH0242hikariogblanchat.png (3.09 MB, 2560x1661)
3.09 MB PNG
>>108759677
I want to release in her mouth.
>>
Why are windowsfags so obsessed with this lately?
>>
can it be used to gain root on android??
>>
>>108755119
different system then corpo jorpo sorry not installing industry garbage tied to a company that values investor statisfaction over user statisfactio
>>
>>108764614
No, Android doesn't use the af_alg module.
>>
>>108764636
sad!
>>
>>108763055
Basically nobody.
>>
vmmmmm lads my phone is vulnerable and it's EOL???
tf do i do
>>
>>108764853
what phone is that?
>>
>>108764930
old pixel
>>
Wasn't there an exploit for Windows just the other day for getting SYSTEM privileges?
>>
>>108755220
based Russian spies BTFOing proprietary zogbot ware.
>>
>9 years old exploit
jesus christ
>>
>>108764974
9 year old bug.
The exploit is only a few weeks old.
>>
So we can now root every Android phone, right?
If not, then its bullshit, if yes, that's great.
No matter what, its a win.
>>
>>108757255
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=72548b093ee3

Stephan Mueller chronox.de

He did work for German feds at times and he is involved in VeraCrypt as well.
>>
>>108764329
that wouldn't've'st happened if everything was contenerized and managed by systemd
>>
>>108765033
>33
c-check'd
>>
>>108764987 see >>108755149
>>
>>108767594
>>108767594
Aids
>>
>>108765033
on the other hand he's also german so he was probably just trying to do things in a stupid and complicated way for funsies
>>
>>108764595
They are desperate for a win against Linubermensch
>>
>>108755119
why the fuck someone would have user access to being with? its just a nothing burger
>>
>>108765033
>VeraCrypt
that's spooky
>>
>>108754992
This post is nearly 4 days old with 61 replies, this dogshit site is deader than stack overflow
>>
>>108771361
The exploit is serious.
But since its the local Winjeet spamer, paired with a youtube thumbnail screencap, nobody cares about it. Everybody sees it as just yet another mentally ill spam thread and moves on.

I find it interesting that this isn't causing more drama. It's the most interesting aspect of it. It makes me wonder if it is a glowfag backdoor that got discovered here.
>>
>>108769645
Because it's a webserver, that runs under its own user for isolation, and some idiot fucked up a CGI script.
>>
>>108769645
somebody who wants user access will often get user access
due to >>108772109
>>
>>108755149
>privilege escalation
>backdoor
Retard-kun.
>>
>>108772241
Combine it with the cue RCE from Gnome and it means that every single RHEL corpo machine between 2017 and 2023 (Microsoft Azure hack) could get taken over completely by sending an email. No need for the user to open or even click on anything.
>>
>>108772319
And both of those exploits had an eerie silence to them.
Meanwhile the xz backdoor, that affected absolutely noone, got popularized.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.