|
|
Message-ID: <PA4PR02MB8239F8BF23F68BB4B1612227DE302@PA4PR02MB8239.eurprd02.prod.outlook.com> Date: Sun, 3 May 2026 18:06:38 +0000 From: Paul Ducklin <pducklin@...look.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Re: CVE-2026-31431: CopyFail: linux local privilege scalation >So one solution would be to get the >fingers-of-one-hand applications still >using the interface off it onto user-mode >software-only and then make it >kernel-only, closing the door on the entire >attack surface from user space Perhaps the mantra, “never break user space” needs rewriting as, “break user space only when something is already broken” (such as when the number of CVEs already associated with that thing exceeds some smallish positive integer N, say, 5). Duck
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.