frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Two weeks since I shipped my iOS app – actual numbers, mostly embarrassing ones

https://medium.com/@sklyarov/i-built-an-ai-mental-health-app-for-my-wife-heres-what-happened-in-t...
1•sklyarov•50s ago•0 comments

OpenAI Codex system prompt includes directive: "never talk about goblins"

https://arstechnica.com/ai/2026/04/openai-codex-system-prompt-includes-explicit-directive-to-neve...
1•ndr42•1m ago•0 comments

Philosophers Should Care About Computational Complexity (2011) [pdf]

https://www.scottaaronson.com/papers/philos.pdf
1•downbad_•1m ago•1 comments

Granite 4.1 LLMs: How They're Built

https://huggingface.co/blog/ibm-granite/granite-4-1
1•shallow-mind•3m ago•0 comments

Show HN: Generative UI Library for React

https://www.getsyntux.com/
1•BeverlyHills001•3m ago•0 comments

Grok Voice API

https://x.ai/api/voice
1•hmokiguess•3m ago•0 comments

Assembly – Pre-launch consumer intelligence for D2C brands

https://www.assemblysimulator.com/
1•pranshpatwa•5m ago•0 comments

Ask HN: Show Us Your Personal Agents?

1•arionhardison•5m ago•0 comments

How to Use ChatGPT to Find Real Flight Deals?

https://www.steaktek.com/artificial-intelligence/how-to-use-chatgpt-to-find-real-flight-deals/
1•Newspaperworld•7m ago•0 comments

Limiting Not Just Screen Time, but Screen Space

https://www.noemamag.com/limiting-not-just-screen-time-but-screen-space/
1•taubek•7m ago•0 comments

The Fab Charter

https://fab.cba.mit.edu/about/charter/
2•barishnamazov•7m ago•0 comments

Odysseys: Benchmarking Web Agents on Realistic Long Horizon Tasks

https://odysseys-website.pages.dev/
1•cmitsakis•9m ago•0 comments

An API with Rights over Everything

https://aitwerp.com/signals/railway-agent-database-deleted/
1•Inziu•9m ago•0 comments

Trump officials draft plan to bring Anthropic back amid Pentagon fight

https://www.axios.com/2026/04/29/trump-anthropic-pentagon-ai-executive-order-gov
1•naves•10m ago•0 comments

The Port of Oslo 1798 – Remastered

https://tidvis.itch.io/oslo-havn-1798-rm
1•hoxmark•12m ago•1 comments

Clojure us the future of AI coding, but you won't use it

https://latypoff.com/clojure-is-the-future-of-ai-coding-but-you-wont-use-it/
1•nlitened•13m ago•0 comments

Cisco vs. DOE – SCOTUS to further narrow judgements on the international law

https://www.scotusblog.com/2026/04/court-seems-likely-to-narrow-ability-of-plaintiffs-to-bring-cl...
3•class4behavior•15m ago•0 comments

Anthropic's Argument for Mythos SWE-bench improvement contains a fatal error

https://www.philosophicalhacker.com/post/anthropic-error/
2•jryio•15m ago•0 comments

"People who don't use AI will be left behind"

https://migrainebrain.bearblog.dev/people-who-dont-use-ai-will-be-left-behind/
2•speckx•16m ago•0 comments

The Moral and Medical Panic over Bicycles (2020)

https://www.mcgill.ca/oss/article/history-did-you-know/moral-and-medical-panic-over-bicycles
1•thelastgallon•16m ago•0 comments

AI agents (Grok vs. GPT-4o mini) compete in live crypto paper trading

https://cryptoaiarena.com/
1•edgar_dev•17m ago•0 comments

Show HN: AP Quiz – mobile-first AP practice prep web app

https://ap-quiz.com
1•coolwulf•20m ago•1 comments

The Inadequacy of House Burping

https://www.greenbuildingadvisor.com/article/the-inadequacy-of-house-burping
1•quercusa•21m ago•0 comments

France unveils plan to phase out fossil fuels by 2050

https://www.ctvnews.ca/climate-and-environment/article/france-unveils-plan-to-ditch-all-fossil-fu...
1•mpweiher•21m ago•0 comments

Mathematical Writing [pdf]

https://jmlr.csail.mit.edu/reviewing-papers/knuth_mathematical_writing.pdf
2•susam•23m ago•0 comments

CotEditor – plain text editor for macOS

https://coteditor.com
3•bitigchi•23m ago•0 comments

The Quant Engine is live

https://newsfinanceai.com/
1•globalbiz•23m ago•0 comments

DevCam – Native macOS screen recorder

https://www.devcam.app/
1•dumitrujonathan•24m ago•1 comments

Seer – Open-source local AI image descriptions for screen readers (no API key)

https://github.com/recursia-lab/Seer
1•chiachi•24m ago•1 comments

Ruby One-Liners Guide

https://learnbyexample.github.io/learn_ruby_oneliners/cover.html
1•thunderbong•25m ago•0 comments
Open in hackernews

Copy Fail – CVE-2026-31431

https://copy.fail/
147•unsnap_biceps•1h ago

Comments

not_your_vase•1h ago
Is there a readable version of the exploit readily available by any chance? Gotta admit that I failed binary-zip-interpretation-with-naked-eye class twice
progval•58m ago
The binary "zip" isn't the exploit, it's the shellcode. The exploit is the rest, which changes the code of a SUID executable (su).
Lorin•1h ago
What is the rationale behind naming CVEs and individual domains? Marketing?
ronsor•1h ago
It makes sure people don't forget about the vulnerabilities, at least
Fuzzbit•58m ago
Same reason they name storms, numbers scare normies
skilled•57m ago
Probably to some extent it is marketing, but generally it has to do with significant bug finds to get the message out to the people who need to apply patches and/or be informed. Heartbleed, Log4Shell, etc.

Very few CVE’s get names dedicated to them like this, because usually when they do - it is very serious, as in this case.

john_strinlai•52m ago
can you remember what CVE-2021-44228 is without looking it up? CVE-2014-6271? CVE-2017-5753?

i bet if i told you their names, you would instantly know what vulns those are.

its easier to talk about things with names. it hurts no one. it takes approximately no effort or time.

CVEs are, for whatever reason, like the only thing on the planet that people seem to have a problem with when they receive a name. i am not sure why.

evanjrowley•51m ago
The AI generated prose screams marketing. Marketing is why there's a "Contact our Security Team" form at the bottom of the page.
diath•35m ago
It's an advertisement for their tool that found the exploit: https://copy.fail/#contact, https://xint.io/products/xint-code
dgellow•28m ago
Yes, originally it was to help spread awareness. Now it has become more of a gimmick I would say
eddythompson80•25m ago
Giving catchy names for bad exploits has been a thing for a while. Probably to make sure it's easy to reference and make sure you're patches as opposed to passing numbers around. Heartbleed, Shellshock, BEAST, Goto Fail, etc
tptacek•18m ago
It's certainly marketing, but it's prosocial: there's no scarcity of names, and "copy.fail" is much easier to remember and talk about than "CVE-2026-31431".
baggy_trough•56m ago
Is this fixed in any stable release kernel yet?
Wingy•29m ago
7.0-rc1 has a tag with it:

    % git describe a664bf3d603d
    v7.0-rc1-10-ga664bf3d603d
I suspect this means the stable 7.0 has it too.
skilled•54m ago
This looks like an extraordinary find at first glance.

Does this mean you can go from a basic web shell from a shared hosting account to root? I can see how that could wreak havoc really quickly.

barbegal•40m ago
Yes I would imagine lots of those type of services would be vulnerable if they hadn't updated to the latest kernel versions.
stackghost•38m ago
As of this comment, Debian Stable ("Trixie", though I hate codenames) doesn't have a fix in place and remains vulnerable, or at least their CVE tracker shows it as such:

https://security-tracker.debian.org/tracker/CVE-2026-31431

bananamogul•8m ago
"Debian Stable ("Trixie", though I hate codenames)"

You can also call it Debian 13.

corvad•53m ago
If this is verified, this is a very big deal. Root access on any shared computer. Additionally do we know what kernel versions and stable versions have the patch?
Tuna-Fish•19m ago
I just tested on my home server running ubuntu 24.04 LTS with newest kernel from repositories, got root.
Ekaros•50m ago
So this could be usable in lot of places with Python and Linux running? Not that I have too many Linux devices around. Still, might be handy sometimes on personal devices.
kro•48m ago
This can likely be shipped as binary code without dependencies like python, as the bug is in the kernel.
SteveNuts•13m ago
There's nothing specific about this related to Python, that's just demonstrating how it works.

This is usable anywhere on an affected Kernel version

porridgeraisin•49m ago
Better explanation of the write up (still from original exploit author) : https://xint.io/blog/copy-fail-linux-distributions
embedding-shape•48m ago
For mitigation, the page currently basically just says:

> Update your distribution's kernel package to one that includes mainline commit a664bf3d603d

But it isn't very clear to me what Kernel version you can expect that to be in. For Arch/CachyOS, the patch seems to be included in 6.18.22+, 6.19.12+ and 7.0+. If you're on any of the lower versions in the same upstream stable series, you're likely vulnerable right now. Some distro kernels may include the fix in other versions, so check for your distribution.

kro•37m ago
Major os vendors will publish pages with the fixed versions:

https://security-tracker.debian.org/tracker/CVE-2026-31431

https://ubuntu.com/security/CVE-2026-31431

Also, disabling algif_aead is suggested as mitigation

TehCorwiz•47m ago
It does not behave as described on EndeavorOS (arch-based) running kernel 6.19.14-arch1-1. I receive the error:

Password: su: Authentication token manipulation error

I'm guessing this means it's already patched?

dimastopel•46m ago
same result on my arch machine as well.
john_strinlai•45m ago
yes, it was reported on march 23rd, patches on april 1.

you are reading about it now because it has been patched.

marshray•9m ago
No it hasn't.

Ubuntu before 26.04 LTS (released a week ago) are currently listed as vulnerable.

Debian other than forky and sid are currently listed as vulnerable.

This is a disgrace.

john_strinlai•7m ago
Disclosure timeline

    2026-03-23Reported to Linux kernel security team
    2026-03-24Initial acknowledgment
    2026-03-25Patches proposed and reviewed
    2026-04-01Patch committed to mainline
    2026-04-22CVE-2026-31431 assigned
    2026-04-29Public disclosure (https://copy.fail/)
kernel 6.19.14-arch1-1, the kernel in question from the parent comment, has been patched.
w2seraph•44m ago
holy smokes it just rooted my just installed from ISO Ubuntu server
rany_•42m ago
Could this be used to root Android devices? Does Android ship with algif_aead?
zb3•35m ago
Android is smarter than setuid + system partitions aren't writable.
int0x29•21m ago
Its not writing to the partition though is it? It is polluting the cache page via a write with a buffer overrun in the kernel. I don't think buffer overruns follow permissions.

Edit: I think the bigger issue is the lack of setuid mounts in a default install.

firer•12m ago
System partitions being non-writable has nothing to do with the vulnerability - it allows modifying the cache of any file that you can open for reading.

Not using setuid anywhere means you'd have to build a slightly more clever exploit, but it's still trivial - just modify some binary you know will run as root "soon".

But... I didn't check, but IIRC the untrusted_app secontext that apps run in is not allowed to open AF_ALG sockets - so you can't directly trigger the vulnerability as a malicious app. Although it might be possible in some roundabout way (requesting some more privileged crypto service to do so).

int0x29•6m ago
My allegedly fully patched pixel 8 pro allowed an AF_ALG socket to open under termux without virtualization so I'm not sure the last but is true
notpushkin•18m ago
I’ve poked around on my phone and it didn’t work:

    File "/data/data/com.termux/files/home/a.py", line 5, in c
      a=s.socket(38,5,0); # ...
    File "/data/data/com.termux/files/usr/lib/python3.13/socket.py", line 233, in __init__
      _socket.socket.__init__(self, family, type, proto, fileno)
      ~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  PermissionError: [Errno 13] Permission denied
int0x29•12m ago
I got line 5 to run and failed on line 8 due to lack of su. I'd need to find a user accessible setuid binary for it to work.

Traceback (most recent call last): File "/data/data/com.termux/files/home/exploit.py", line 8, in <module> f=g.open("/usr/bin/su",0);i=0;e=zlib.decompress(d("78daab77f57163626464800126063b0610af82c101cc7760c0040e0c160c301d209a154d16999e07e5c1680601086578c0f0ff864c7e568f5e5b7e10f75b9675c44c7e56c3ff593611fcacfa499979fac5190c0c0c0032c310d3")) ^^^^^^^^^^^^^^^^^^^^^^^ FileNotFoundError: [Errno 2] No such file or directory: '/usr/bin/su'

notpushkin•8m ago
Try /system/bin/ping
jzb•38m ago
This is amazing. Page says it works on RHEL 14.3, which doesn’t exist. Current RHEL is 10.x, this must’ve been done in a TARDIS.
rdtsc•26m ago
> This is amazing. Page says it works on RHEL 14.3, which doesn’t exist. Current RHEL is 10.x, this must’ve been done in a TARDIS.

Indeed. "Distributions we directly verified: RHEL 14.3". Directly verified by me to be AI slop (the release page at least).

https://access.redhat.com/articles/red-hat-enterprise-linux-...

> Talk to our security experts

(at the bottom of the page)

I have a sneaking suspicion his first name is Claude. Don't get me wrong though, he is pretty good I hear.

tptacek•21m ago
I have no idea about this page, but Theori/Xint has a staff of veterans, they are a serious thing.
rdtsc•18m ago
The fact that they have no idea RHEL 14, probably the most well known enterprise distro, is not a thing, and yet they "directly verified on it" casts some doubt on seriousness.
tptacek•17m ago
I don't know what to tell you. I'm sure you have them dead to rights on Linux distro knowledge reliability, but the exploit here is real, and the vulnerability researchers they have on staff are also real. Xint is not generally a slop factory.

It's ironic that the one thing LLMs can't do reliably in this space is "write copy for humans" (I don't trust them for that either).

bryanlarsen•6m ago
On the same line it says kernel version 6.12.0-124.45.1.el10_1. Which is RHEL 10. This is the kind of typo that humans make -- the hard to type numbers are accurate because they're cut and pasted, but the "easy" numbers have errors because they're not cut and pasted.
themafia•37m ago
> If your kernel was built between 2017 and the patch

This is why I compile my own kernel. I disable things I don't use. If it's not present it can't hurt you.

> block AF_ALG socket creation via seccomp regardless of patch state.

Likewise I use seccomp to only allow syscalls that are necessary. Everything else is disabled. In the programs I have that need to connect to a backend socket, that is done, and then socket creation is disabled.

maxtaco•37m ago
Does not seem like a good idea to run arbitrary code on your machine, please consider not running this script. It seems to be attempting to make permanent changes to your system binaries. I'm not saying the exploit isn't legit, I'm just saying, use extreme caution!!
charcircuit•33m ago
The page explicitly describes that it stealthy as it does not make permanent changes, only corrupting the binary in memory.
stackghost•21m ago
Analysis of the POC concurs with my tests that confirm that the portion of `su` that gets overwritten does not survive a reboot.
charcircuit•36m ago
SUID binaries once again assisted a local privilege escalation attack. This is a major problem that distros can't keep ignoring.
bblb•34m ago
What is "RHEL 14.3"? Was this site a one shot prompt. Quality.
DetroitThrow•31m ago
Despite the copy/images being weird about RHEL 14.3, this seems to work. Wow?
layer8•31m ago
Debian page: https://security-tracker.debian.org/tracker/CVE-2026-31431
dgellow•30m ago
That’s the most AI-written page ever made
phreack•26m ago
The page itself seems vibecoded and a bit of an advertisement, but it does look like the vulnerability is real and high risk. It does explain the big security update I just got, guess I'll prioritize updating today.
chasil•21m ago
On the downside, I need to push new kernels to all my servers.

On this bright side, does this mean Magisk is coming to all unpatched Android phones?

progval•17m ago
So this replaces a SUID binary, in order to run as PID 0. The website claims it can escape "Kubernetes / container clusters" and "CI runners & build farms" but I don't see anything supporting the claim it can escape a container (or specifically, a user namespace).

I ran the exploit in rootless Podman, and predictably it doesn't escape the container.

They also claim their script "roots every Linux distribution shipped since 2017.", but only tested four; and it doesn't work on Alpine

embedding-shape•17m ago
Did you try it on systems that don't have the patch already? Seems many distributions already shipped kernels with the patch ~a month ago.
progval•14m ago
Yes. Alpine in rootless Podman doesn't work (after replacing "/usr/bin/su" with "/bin/su" in the .py, running the .py just doesn't do anything) while it does in Debian in rootless Podman on the same host.
amusingimpala75•12m ago
Their PoC does as you say, but is built upon arbitrary modification of the page cache, which could be abused for the other things
rcxdude•9m ago
If you can get to real UID 0 from a rootless container, you can escape it, but you do need to take extra steps. Same with it working on Alpine: the underlying vulnerability probably still exists, but the script might need some adjusting. It's a PoC, not a full exploit for every situation.
john_strinlai•8m ago
>The website claims it can escape "Kubernetes / container clusters" and "CI runners & build farms" but I don't see anything supporting the claim it can escape a container

they state that the write-up is forthcoming. presumably there is some additional steps or modifications that will be detailed in the 'part 2'.

"Next: "From Pod to Host," how Copy Fail escapes every major cloud Kubernetes platform."