• youtube.com video about kernel exploit

    From David@3:633/10 to All on Sunday, May 03, 2026 08:00:02
    Hi, I just watched an interesting youtube video [1] about a
    security vulnerability CVE-2026-31431 [2] in the linux kernel.

    It allows widespread local priviledge escalation to root.

    For Debian, this has just been fixed [2] in the latest kernel packages, available for trixie [3] since 30 April and bookworm [4] since 01 May.

    [1] https://www.youtube.com/watch?v=MaFK5AXpXXw
    [2] https://security-tracker.debian.org/tracker/CVE-2026-31431
    [3] https://lists.debian.org/debian-security-announce/2026/msg00148.html
    [4] https://lists.debian.org/debian-security-announce/2026/msg00154.html

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From David@3:633/10 to All on Sunday, May 03, 2026 08:10:01
    On Sun, 3 May 2026 at 05:58, David <bouncingcats@gmail.com> wrote:

    Hi, I just watched an interesting youtube video [1] about a
    [1] https://www.youtube.com/watch?v=MaFK5AXpXXw

    Sorry, I forgot to mention that youtube.com and the video
    contain advertisements. I use an ad-blocker, and just fast-forward
    through the 1 embedded advertisement.

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From tomas@3:633/10 to All on Sunday, May 03, 2026 08:20:01
    On Sun, May 03, 2026 at 06:04:18AM +0000, David wrote:
    On Sun, 3 May 2026 at 05:58, David <bouncingcats@gmail.com> wrote:

    Hi, I just watched an interesting youtube video [1] about a
    [1] https://www.youtube.com/watch?v=MaFK5AXpXXw

    Sorry, I forgot to mention that youtube.com and the video
    contain advertisements. I use an ad-blocker, and just fast-forward
    through the 1 embedded advertisement.
    In general, I don't use youtube. If I really, really must, I use
    yt-dlp. Should that stop working, good riddance.
    Cheers
    --
    t


    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Geert Stappers@3:633/10 to All on Sunday, May 03, 2026 08:40:01
    On Sun, May 03, 2026 at 08:11:31AM +0200, tomas@tuxteam.de wrote:
    On Sun, May 03, 2026 at 06:04:18AM +0000, David wrote:
    On Sun, 3 May 2026 at 05:58, David <bouncingcats@gmail.com> wrote:

    Hi, I just watched an interesting youtube video [1] about a
    [1] https://www.youtube.com/watch?v=MaFK5AXpXXw

    Sorry, I forgot to mention that youtube.com and the video
    contain advertisements. I use an ad-blocker, and just fast-forward
    through the 1 embedded advertisement.

    I would like to swap that "Sorry" for the name of the exploit.
    Right now is my guess that the video is about https://copy.fail
    Yes, the exploit has a name and website.


    In general, I don't use youtube.
    If I really, really must, I use yt-dlp.

    An opinion is like an asshole: Every one has one.


    Should that stop working, good riddance.

    Everything ends. Some things should end sooner.


    Cheers

    Oh, that television show set in a pub, about people being people.


    Regards
    Geert Stappers
    --
    Sturgeon is the man

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Michel Verdier@3:633/10 to All on Sunday, May 03, 2026 09:40:01
    On 2026-05-03, Geert Stappers wrote:

    I would like to swap that "Sorry" for the name of the exploit.
    Right now is my guess that the video is about https://copy.fail
    Yes, the exploit has a name and website.

    David in his first mail give us the CVE and the link [2] which contains
    your link (copy.fail) in the notes.
    Of course you miss that because social networks focus us too much :)

    [2] https://security-tracker.debian.org/tracker/CVE-2026-31431

    --- PyGate Linux v1.5.14
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)