Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <PA4PR02MB8239F8BF23F68BB4B1612227DE302@PA4PR02MB8239.eurprd02.prod.outlook.com>
Date: Sun, 3 May 2026 18:06:38 +0000
From: Paul Ducklin <pducklin@...look.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: Re: CVE-2026-31431: CopyFail: linux local privilege
 scalation

>So one solution would be to get the
>fingers-of-one-hand applications still
>using the interface off it onto user-mode
>software-only and then make it
>kernel-only, closing the door on the entire
>attack surface from user space

Perhaps the mantra, “never break user space” needs rewriting as, “break user space only when something is already broken” (such as when the number of CVEs already associated with that thing exceeds some smallish positive integer N, say, 5).

Duck

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.