Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Ah, the #copyfail clickbait posts are coming.

Ah, the #copyfail clickbait posts are coming.

Scheduled Pinned Locked Moved Uncategorized
copyfail
50 Posts 22 Posters 3 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jwildeboer@social.wildeboer.netJ This user is from outside of this forum
    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
    jwildeboer@social.wildeboer.net
    wrote last edited by
    #1

    Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

    initcall_blacklist=algif_aead_init

    to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

    # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

    This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

    1/4

    Link Preview Image
    sibrosan@mastodon.socialS truls46@mastodon.socialT reizzentrum@chaos.socialR larsmb@mastodon.onlineL grumpasaurus@infosec.exchangeG 12 Replies Last reply
    1
    0
    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

      Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

      initcall_blacklist=algif_aead_init

      to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

      # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

      This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

      1/4

      Link Preview Image
      sibrosan@mastodon.socialS This user is from outside of this forum
      sibrosan@mastodon.socialS This user is from outside of this forum
      sibrosan@mastodon.social
      wrote last edited by
      #2

      @jwildeboer On #Ubuntu, just make sure your system is up to date. The mitigation (disabling the kernel module that has the vulnerability) is automatically installed.

      jwildeboer@social.wildeboer.netJ 1 Reply Last reply
      0
      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

        Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

        initcall_blacklist=algif_aead_init

        to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

        # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

        This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

        1/4

        Link Preview Image
        truls46@mastodon.socialT This user is from outside of this forum
        truls46@mastodon.socialT This user is from outside of this forum
        truls46@mastodon.social
        wrote last edited by
        #3

        @jwildeboer Apparently GrapheneOS (and Android in general?) is protected against CopyFail through the SELinux configuration.

        Do you happen to know how that is achieved?

        jwildeboer@social.wildeboer.netJ 1 Reply Last reply
        0
        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

          Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

          initcall_blacklist=algif_aead_init

          to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

          # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

          This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

          1/4

          Link Preview Image
          reizzentrum@chaos.socialR This user is from outside of this forum
          reizzentrum@chaos.socialR This user is from outside of this forum
          reizzentrum@chaos.social
          wrote last edited by
          #4

          @jwildeboer
          How many servers you are managing? 5? 50? 500? 5000? Even more? And how many are NOT yours?

          jwildeboer@social.wildeboer.netJ 1 Reply Last reply
          0
          • sibrosan@mastodon.socialS sibrosan@mastodon.social

            @jwildeboer On #Ubuntu, just make sure your system is up to date. The mitigation (disabling the kernel module that has the vulnerability) is automatically installed.

            jwildeboer@social.wildeboer.netJ This user is from outside of this forum
            jwildeboer@social.wildeboer.netJ This user is from outside of this forum
            jwildeboer@social.wildeboer.net
            wrote last edited by
            #5

            @sibrosan My approach works independently of it being a module or not. So as far as mitigations go, it’s a bit more universal. And in a few days we all have updated kernel packages anyway.

            sibrosan@mastodon.socialS 1 Reply Last reply
            0
            • reizzentrum@chaos.socialR reizzentrum@chaos.social

              @jwildeboer
              How many servers you are managing? 5? 50? 500? 5000? Even more? And how many are NOT yours?

              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
              jwildeboer@social.wildeboer.net
              wrote last edited by
              #6

              @Reizzentrum I personally manage 9 RHEL machines. This mitigation is easy to deploy, automation for it with Ansible is available. And very soon the updated kernel packages will be available that solve the problem, meaning this mitigation can be removed again.

              1 Reply Last reply
              0
              • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                initcall_blacklist=algif_aead_init

                to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                1/4

                Link Preview Image
                larsmb@mastodon.onlineL This user is from outside of this forum
                larsmb@mastodon.onlineL This user is from outside of this forum
                larsmb@mastodon.online
                wrote last edited by
                #7

                @jwildeboer I'm confused somewhat by how distros didn't pick it up, looks like some don't have representatives on the kernel list?

                echopapa@social.tchncs.deE jwildeboer@social.wildeboer.netJ 2 Replies Last reply
                0
                • truls46@mastodon.socialT truls46@mastodon.social

                  @jwildeboer Apparently GrapheneOS (and Android in general?) is protected against CopyFail through the SELinux configuration.

                  Do you happen to know how that is achieved?

                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                  jwildeboer@social.wildeboer.net
                  wrote last edited by
                  #8

                  @truls46 No.

                  1 Reply Last reply
                  0
                  • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                    @sibrosan My approach works independently of it being a module or not. So as far as mitigations go, it’s a bit more universal. And in a few days we all have updated kernel packages anyway.

                    sibrosan@mastodon.socialS This user is from outside of this forum
                    sibrosan@mastodon.socialS This user is from outside of this forum
                    sibrosan@mastodon.social
                    wrote last edited by
                    #9

                    @jwildeboer Apparently in Ubuntu the vulnerability is in a module.
                    Of cou rse that may not be the case if you replaced the kernel with a custom one.

                    IMO for ordinary Ubuntu users who are not familiar with tinkering with their system, the quickest and easiest fix is to run the Update Manager.

                    jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                    0
                    • sibrosan@mastodon.socialS sibrosan@mastodon.social

                      @jwildeboer Apparently in Ubuntu the vulnerability is in a module.
                      Of cou rse that may not be the case if you replaced the kernel with a custom one.

                      IMO for ordinary Ubuntu users who are not familiar with tinkering with their system, the quickest and easiest fix is to run the Update Manager.

                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                      jwildeboer@social.wildeboer.net
                      wrote last edited by
                      #10

                      @sibrosan In other distros it’s compiled into the kernel, so not a module. I am trying to share immediate mitigation. I’m not interested in yet another distro war.

                      sibrosan@mastodon.socialS 1 Reply Last reply
                      0
                      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                        Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                        initcall_blacklist=algif_aead_init

                        to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                        # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                        This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                        1/4

                        Link Preview Image
                        grumpasaurus@infosec.exchangeG This user is from outside of this forum
                        grumpasaurus@infosec.exchangeG This user is from outside of this forum
                        grumpasaurus@infosec.exchange
                        wrote last edited by
                        #11

                        @jwildeboer fake fact that makes perfect sense to a cockney speaker.

                        jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                        0
                        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                          @sibrosan In other distros it’s compiled into the kernel, so not a module. I am trying to share immediate mitigation. I’m not interested in yet another distro war.

                          sibrosan@mastodon.socialS This user is from outside of this forum
                          sibrosan@mastodon.socialS This user is from outside of this forum
                          sibrosan@mastodon.social
                          wrote last edited by
                          #12

                          @jwildeboer Sure! My intention was just a heads-up to fellow #Ubuntu users who are not too familiar with things like adding stuff to your kernel boot commandline.

                          jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                          0
                          • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                            Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                            initcall_blacklist=algif_aead_init

                            to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                            # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                            This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                            1/4

                            Link Preview Image
                            jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                            jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                            jwildeboer@social.wildeboer.net
                            wrote last edited by
                            #13

                            Some more details from our CVE page on CVE-2026-31431 at https://access.redhat.com/security/cve/cve-2026-31431 For more infos also on availability of updates see https://nvd.nist.gov/vuln/detail/CVE-2026-31431and https://www.cve.org/CVERecord?id=CVE-2026-31431

                            2/4

                            Link Preview Image
                            jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                            0
                            • grumpasaurus@infosec.exchangeG grumpasaurus@infosec.exchange

                              @jwildeboer fake fact that makes perfect sense to a cockney speaker.

                              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                              jwildeboer@social.wildeboer.net
                              wrote last edited by
                              #14

                              @grumpasaurus What is fake about the mitigation and the vulnerability in your opinion? And why do you think that insinuating that under my post where I try to help my fellow sysadmins is helpful?

                              grumpasaurus@infosec.exchangeG 1 Reply Last reply
                              0
                              • sibrosan@mastodon.socialS sibrosan@mastodon.social

                                @jwildeboer Sure! My intention was just a heads-up to fellow #Ubuntu users who are not too familiar with things like adding stuff to your kernel boot commandline.

                                jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                jwildeboer@social.wildeboer.net
                                wrote last edited by
                                #15

                                @sibrosan Now is a good time to learn about it, I'd say 😉

                                sibrosan@mastodon.socialS 1 Reply Last reply
                                0
                                • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                  @grumpasaurus What is fake about the mitigation and the vulnerability in your opinion? And why do you think that insinuating that under my post where I try to help my fellow sysadmins is helpful?

                                  grumpasaurus@infosec.exchangeG This user is from outside of this forum
                                  grumpasaurus@infosec.exchangeG This user is from outside of this forum
                                  grumpasaurus@infosec.exchange
                                  wrote last edited by
                                  #16

                                  @jwildeboer sorry let me rephrase my joke.

                                  "algif_aead_init" sounds like cockney slang

                                  jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                                  0
                                  • grumpasaurus@infosec.exchangeG grumpasaurus@infosec.exchange

                                    @jwildeboer sorry let me rephrase my joke.

                                    "algif_aead_init" sounds like cockney slang

                                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                    jwildeboer@social.wildeboer.net
                                    wrote last edited by
                                    #17

                                    @grumpasaurus Ah, thx!

                                    1 Reply Last reply
                                    0
                                    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                      Some more details from our CVE page on CVE-2026-31431 at https://access.redhat.com/security/cve/cve-2026-31431 For more infos also on availability of updates see https://nvd.nist.gov/vuln/detail/CVE-2026-31431and https://www.cve.org/CVERecord?id=CVE-2026-31431

                                      2/4

                                      Link Preview Image
                                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                      jwildeboer@social.wildeboer.net
                                      wrote last edited by
                                      #18

                                      Here is @Larvitz gist that gives you an Ansible playbook to deploy the mitigation on (big) fleets: https://burningboard.net/@Larvitz/116498775760655365

                                      3/4

                                      jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                                      0
                                      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                        Here is @Larvitz gist that gives you an Ansible playbook to deploy the mitigation on (big) fleets: https://burningboard.net/@Larvitz/116498775760655365

                                        3/4

                                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                        jwildeboer@social.wildeboer.net
                                        wrote last edited by
                                        #19

                                        The TL;DR of #CopyFail in my opinion: Due to an unusual (I personally think irresponsible) disclosure, we sysadmins are now dealing with having to push out an immediate mitigation until the updated kernel packages become available. I am trying to help in a pragmatic way. This too will pass, but it also shows that running Linux servers comes with responsibilities to protect your machines and users.

                                        4/4

                                        blindcoder@toot.berlinB jwp@cloudisland.nzJ jwildeboer@social.wildeboer.netJ 3 Replies Last reply
                                        0
                                        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                          @sibrosan Now is a good time to learn about it, I'd say 😉

                                          sibrosan@mastodon.socialS This user is from outside of this forum
                                          sibrosan@mastodon.socialS This user is from outside of this forum
                                          sibrosan@mastodon.social
                                          wrote last edited by
                                          #20

                                          @jwildeboer

                                          I´d like to see widespread migration of ordinary computer users from MS Windows to Linux. And I regard awareness that it's easy to keep yourself safe as helpful, and the impression that you need to type complicated stuff in a terminal window not so much.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups