Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Ah, the #copyfail clickbait posts are coming.

Ah, the #copyfail clickbait posts are coming.

Scheduled Pinned Locked Moved Uncategorized
copyfail
50 Posts 22 Posters 3 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

    @sibrosan Now is a good time to learn about it, I'd say ๐Ÿ˜‰

    sibrosan@mastodon.socialS This user is from outside of this forum
    sibrosan@mastodon.socialS This user is from outside of this forum
    sibrosan@mastodon.social
    wrote last edited by
    #20

    @jwildeboer

    Iยดd like to see widespread migration of ordinary computer users from MS Windows to Linux. And I regard awareness that it's easy to keep yourself safe as helpful, and the impression that you need to type complicated stuff in a terminal window not so much.

    1 Reply Last reply
    0
    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

      The TL;DR of #CopyFail in my opinion: Due to an unusual (I personally think irresponsible) disclosure, we sysadmins are now dealing with having to push out an immediate mitigation until the updated kernel packages become available. I am trying to help in a pragmatic way. This too will pass, but it also shows that running Linux servers comes with responsibilities to protect your machines and users.

      4/4

      blindcoder@toot.berlinB This user is from outside of this forum
      blindcoder@toot.berlinB This user is from outside of this forum
      blindcoder@toot.berlin
      wrote last edited by
      #21

      @jwildeboer Thank you for this! โค
      One question, if I understand that correctly it's a local privilege escalation, right?
      So assuming there's no RCE present elsewhere, and I'm the only account on the system, I can relax about CopyFail?

      jwildeboer@social.wildeboer.netJ mihamarkic@mastodon.socialM leeloo@c.imL 3 Replies Last reply
      0
      • larsmb@mastodon.onlineL larsmb@mastodon.online

        @jwildeboer I'm confused somewhat by how distros didn't pick it up, looks like some don't have representatives on the kernel list?

        echopapa@social.tchncs.deE This user is from outside of this forum
        echopapa@social.tchncs.deE This user is from outside of this forum
        echopapa@social.tchncs.de
        wrote last edited by
        #22

        @larsmb

        Debian:

        CVE-2026-31431

        favicon

        (security-tracker.debian.org)

        @jwildeboer

        ikket@mementomori.socialI 1 Reply Last reply
        0
        • blindcoder@toot.berlinB blindcoder@toot.berlin

          @jwildeboer Thank you for this! โค
          One question, if I understand that correctly it's a local privilege escalation, right?
          So assuming there's no RCE present elsewhere, and I'm the only account on the system, I can relax about CopyFail?

          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
          jwildeboer@social.wildeboer.net
          wrote last edited by
          #23

          @blindcoder Yes, it needs local user access. But that could also be tunnelled through an exploitable Wordpress install or other PHP etc stuff. SELinux might already help in that case, but my general rule would be: If the machine is exposed to the internet, deploy the mitigation. For machines that are not open to the internet, like homelabs etc it is an acceptable risk to wait for the updated kernel packages.

          1 Reply Last reply
          0
          • blindcoder@toot.berlinB blindcoder@toot.berlin

            @jwildeboer Thank you for this! โค
            One question, if I understand that correctly it's a local privilege escalation, right?
            So assuming there's no RCE present elsewhere, and I'm the only account on the system, I can relax about CopyFail?

            mihamarkic@mastodon.socialM This user is from outside of this forum
            mihamarkic@mastodon.socialM This user is from outside of this forum
            mihamarkic@mastodon.social
            wrote last edited by
            #24

            @blindcoder @jwildeboer That's my understanding as well, but if an intruder somehow manages to run shell or custom app you might be in trouble

            1 Reply Last reply
            0
            • blindcoder@toot.berlinB blindcoder@toot.berlin

              @jwildeboer Thank you for this! โค
              One question, if I understand that correctly it's a local privilege escalation, right?
              So assuming there's no RCE present elsewhere, and I'm the only account on the system, I can relax about CopyFail?

              leeloo@c.imL This user is from outside of this forum
              leeloo@c.imL This user is from outside of this forum
              leeloo@c.im
              wrote last edited by
              #25

              @blindcoder @jwildeboer
              It appears so.

              As long as by "system" you mean hardware and not a container (e.g. docker).

              1 Reply Last reply
              0
              • larsmb@mastodon.onlineL larsmb@mastodon.online

                @jwildeboer I'm confused somewhat by how distros didn't pick it up, looks like some don't have representatives on the kernel list?

                jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                jwildeboer@social.wildeboer.net
                wrote last edited by
                #26

                @larsmb Could be. I guess the topic is a bit more complex. Some distros have `algif_aead` as module, so you can do the big hammer approach and `rmmod` it, other distros have `algif_aead` compiled into the kernel, so you need a more surgical approach, like the one I described. The surgical approach however has the advantage of working for both setups.

                1 Reply Last reply
                0
                • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                  The TL;DR of #CopyFail in my opinion: Due to an unusual (I personally think irresponsible) disclosure, we sysadmins are now dealing with having to push out an immediate mitigation until the updated kernel packages become available. I am trying to help in a pragmatic way. This too will pass, but it also shows that running Linux servers comes with responsibilities to protect your machines and users.

                  4/4

                  jwp@cloudisland.nzJ This user is from outside of this forum
                  jwp@cloudisland.nzJ This user is from outside of this forum
                  jwp@cloudisland.nz
                  wrote last edited by
                  #27

                  @jwildeboer
                  Tbf whilst It's not great, its AT LEAST not remotely exploitable. Problematic if your workload runs untrusted stuff from external sources directly, absolutely. But likewise not quite as sky is falling as some have seemed to make it out to be.

                  1 Reply Last reply
                  0
                  • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                    The TL;DR of #CopyFail in my opinion: Due to an unusual (I personally think irresponsible) disclosure, we sysadmins are now dealing with having to push out an immediate mitigation until the updated kernel packages become available. I am trying to help in a pragmatic way. This too will pass, but it also shows that running Linux servers comes with responsibilities to protect your machines and users.

                    4/4

                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                    jwildeboer@social.wildeboer.net
                    wrote last edited by
                    #28

                    ADDENDUM: Now also a blog post at https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/

                    tris@chaos.socialT 1 Reply Last reply
                    1
                    0
                    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                      ADDENDUM: Now also a blog post at https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/

                      tris@chaos.socialT This user is from outside of this forum
                      tris@chaos.socialT This user is from outside of this forum
                      tris@chaos.social
                      wrote last edited by
                      #29

                      @jwildeboer Nice! Btw wiki page is up: https://en.wikipedia.org/wiki/Copy_Fail ๐Ÿ™‚

                      1 Reply Last reply
                      0
                      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                        Ah, the #copyfail clickbait posts are coming. Hereโ€™s my contribution. On your Linux machine add

                        initcall_blacklist=algif_aead_init

                        to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                        # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                        This mitigation comes courtesy of Red Hat. Our engineers keep you safe ๐Ÿ™‚

                        1/4

                        Link Preview Image
                        larvitz@burningboard.netL This user is from outside of this forum
                        larvitz@burningboard.netL This user is from outside of this forum
                        larvitz@burningboard.net
                        wrote last edited by
                        #30
                        This post is deleted!
                        flxtr@social.tchncs.deF 1 Reply Last reply
                        0
                        • larvitz@burningboard.netL larvitz@burningboard.net

                          This post is deleted!

                          flxtr@social.tchncs.deF This user is from outside of this forum
                          flxtr@social.tchncs.deF This user is from outside of this forum
                          flxtr@social.tchncs.de
                          wrote last edited by
                          #31

                          @Larvitz Edit: removed unhelpful cheap joke. I'm sorry. Will try harder to resist next time.
                          @jwildeboer

                          jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                          0
                          • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                            Ah, the #copyfail clickbait posts are coming. Hereโ€™s my contribution. On your Linux machine add

                            initcall_blacklist=algif_aead_init

                            to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                            # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                            This mitigation comes courtesy of Red Hat. Our engineers keep you safe ๐Ÿ™‚

                            1/4

                            Link Preview Image
                            sorro@woof.techS This user is from outside of this forum
                            sorro@woof.techS This user is from outside of this forum
                            sorro@woof.tech
                            wrote last edited by
                            #32

                            @jwildeboer since android runs with the linux kernel, is android also affected?

                            jwildeboer@social.wildeboer.netJ caravantraveller@social.cologneC 2 Replies Last reply
                            0
                            • flxtr@social.tchncs.deF flxtr@social.tchncs.de

                              @Larvitz Edit: removed unhelpful cheap joke. I'm sorry. Will try harder to resist next time.
                              @jwildeboer

                              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                              jwildeboer@social.wildeboer.net
                              wrote last edited by
                              #33

                              @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess ๐Ÿ˜ž

                              flxtr@social.tchncs.deF larvitz@burningboard.netL 2 Replies Last reply
                              0
                              • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess ๐Ÿ˜ž

                                flxtr@social.tchncs.deF This user is from outside of this forum
                                flxtr@social.tchncs.deF This user is from outside of this forum
                                flxtr@social.tchncs.de
                                wrote last edited by
                                #34

                                @jwildeboer I'm sorry. You're right. Should have posted the cheap joke in my own feed.
                                @Larvitz

                                1 Reply Last reply
                                0
                                • sorro@woof.techS sorro@woof.tech

                                  @jwildeboer since android runs with the linux kernel, is android also affected?

                                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                  jwildeboer@social.wildeboer.net
                                  wrote last edited by
                                  #35

                                  @Sorro I don't know. Depends if `algif_aead` is compiled into the kernel or loaded as module, if it is present at all in Android kernels. If somebody has checked, please do reply.

                                  H 1 Reply Last reply
                                  0
                                  • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                    Ah, the #copyfail clickbait posts are coming. Hereโ€™s my contribution. On your Linux machine add

                                    initcall_blacklist=algif_aead_init

                                    to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                                    # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                                    This mitigation comes courtesy of Red Hat. Our engineers keep you safe ๐Ÿ™‚

                                    1/4

                                    Link Preview Image
                                    psyhackological@fosstodon.orgP This user is from outside of this forum
                                    psyhackological@fosstodon.orgP This user is from outside of this forum
                                    psyhackological@fosstodon.org
                                    wrote last edited by
                                    #36

                                    @jwildeboer what about those who cannot be downtimed to reboot?

                                    jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                                    0
                                    • echopapa@social.tchncs.deE echopapa@social.tchncs.de

                                      @larsmb

                                      Debian:

                                      CVE-2026-31431

                                      favicon

                                      (security-tracker.debian.org)

                                      @jwildeboer

                                      ikket@mementomori.socialI This user is from outside of this forum
                                      ikket@mementomori.socialI This user is from outside of this forum
                                      ikket@mementomori.social
                                      wrote last edited by
                                      #37

                                      @echopapa @larsmb @jwildeboer alma (yay the new centos model ๐ŸŽ‰) https://almalinux.org/blog/2026-05-01-cve-2026-31431-copy-fail/

                                      1 Reply Last reply
                                      0
                                      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                        Ah, the #copyfail clickbait posts are coming. Hereโ€™s my contribution. On your Linux machine add

                                        initcall_blacklist=algif_aead_init

                                        to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                                        # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                                        This mitigation comes courtesy of Red Hat. Our engineers keep you safe ๐Ÿ™‚

                                        1/4

                                        Link Preview Image
                                        moses_izumi@fe.disroot.orgM This user is from outside of this forum
                                        moses_izumi@fe.disroot.orgM This user is from outside of this forum
                                        moses_izumi@fe.disroot.org
                                        wrote last edited by
                                        #38
                                        @jwildeboer
                                        There's a special place in hell for security researchers who obfuscate their proof-of-concept exploit code.
                                        1 Reply Last reply
                                        0
                                        • sorro@woof.techS sorro@woof.tech

                                          @jwildeboer since android runs with the linux kernel, is android also affected?

                                          caravantraveller@social.cologneC This user is from outside of this forum
                                          caravantraveller@social.cologneC This user is from outside of this forum
                                          caravantraveller@social.cologne
                                          wrote last edited by
                                          #39

                                          @Sorro @jwildeboer

                                          Are there any users on your Android phone who might take advantage of #copyfail ?

                                          For single-user systems there is no problem, because it's not a remote exploit.

                                          sorro@woof.techS 1 Reply Last reply
                                          0
                                          • R relay@relay.infosec.exchange shared this topic
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups