Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Today I have spent way too much time handling the https://copy.fail situation #copyfail

Today I have spent way too much time handling the https://copy.fail situation #copyfail

Scheduled Pinned Locked Moved Uncategorized
copyfail
62 Posts 29 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • raven667@hachyderm.ioR raven667@hachyderm.io

    @OmegaPolice @alexanderkjall yes and the majority of Linux kernel development is not volunteers, its a consortium of vendors organized through the Linux Foundation trade org which _does_ pay people. There are still volunteers who work on Linux but they shouldn't be a shield for the majority to pretend they are "just a smol bean, uwu" and dont have some responsibilities.

    I'm the *first* to say that dragging volunteer FOSS maintainers is shitty (and that volunteers shouldn't cosplay as commercial vendors, by doing things like having public issue trackers, as it is nonsense to "open a support case" with a tracking number against a *volunteer*) but Linux kernel has volunteers it is not a volunteer led project anymore, its a consortium of major companies which benefit from pooling effort and having a neutral forum to collaborate.

    I think security focused people, whose customers are also prioritizing security sometimes dont have empathy for or understand people who don't have security as their top priority, and treat people who don't share their priorities as stupid and incompetent, rather than understanding the differences in goals and constraints. That said there is probably room for improvement on kernel security, but more from a better systematic approach to prevent defects than treating every bug with a website as some super secret special thing. the current design makes a constant stream of local exploits inevitable

    alexanderkjall@mastodon.socialA This user is from outside of this forum
    alexanderkjall@mastodon.socialA This user is from outside of this forum
    alexanderkjall@mastodon.social
    wrote last edited by
    #19

    @raven667 @OmegaPolice I agree that it would be great if the kernel security team had a process that made life simpler for downstream vendors.

    But since neither me or my employer contributes anything to make that happen I don't think it's my place to have public opinions about it.

    Personally I would love to see more effort focused on reducing the attack surface of the kernel.

    1 Reply Last reply
    0
    • labanskoller@infosec.exchangeL labanskoller@infosec.exchange

      @jmm @alexanderkjall I think I mixed it up with the Linux kernel security team. But shouldn’t *that* team notify the distros?

      poslovitch@wikis.worldP This user is from outside of this forum
      poslovitch@wikis.worldP This user is from outside of this forum
      poslovitch@wikis.world
      wrote last edited by
      #20

      @LabanSkoller @jmm @alexanderkjall No non I actually read that too from the FAQ on the Copyfail page yesterday. So. That was a lie?

      1 Reply Last reply
      0
      • alexanderkjall@mastodon.socialA alexanderkjall@mastodon.social

        Today I have spent way too much time handling the https://copy.fail situation #copyfail

        The persons who discovered it didn't notify the distribution security list, so no patched kernels was available for people to install when they released it.

        But they did have time to write an exploit, and thought it was a good idea to distribute that on day one, before vendors had time to provide patches.

        I'm not very impressed with xint.io, I guess it's the marketing department that runs the show.

        regishaubourg@mastodon.socialR This user is from outside of this forum
        regishaubourg@mastodon.socialR This user is from outside of this forum
        regishaubourg@mastodon.social
        wrote last edited by
        #21

        @alexanderkjall and strangely disclosed just before the 1st of may, like the mongobleed disclosed just before 1st of January.
        Almost as a buzz strategy, pushing IT folks to work on weekends and public holidays.
        Seriously, waiting next Monday, letting a weekend to all distros was so hard?

        1 Reply Last reply
        0
        • penguin42@mastodon.org.ukP penguin42@mastodon.org.uk

          @alexanderkjall That feels too complicated to leave to leave just to a (potentially 1st time) reporter. I would have hoped that at the very least the LK security team would track with the reporter and remind them of the need to do the other bits regularly. Especially on a nasty one!

          pwaring@social.xk7.netP This user is from outside of this forum
          pwaring@social.xk7.netP This user is from outside of this forum
          pwaring@social.xk7.net
          wrote last edited by
          #22

          @penguin42 @alexanderkjall I agree, having to report to 3 different lists, in a particular order, all with their own policies and methods of working, seems overly complex.

          (the complexity may be necessary, but I can see why someone might miss out some steps)

          1 Reply Last reply
          0
          • alexanderkjall@mastodon.socialA alexanderkjall@mastodon.social

            Today I have spent way too much time handling the https://copy.fail situation #copyfail

            The persons who discovered it didn't notify the distribution security list, so no patched kernels was available for people to install when they released it.

            But they did have time to write an exploit, and thought it was a good idea to distribute that on day one, before vendors had time to provide patches.

            I'm not very impressed with xint.io, I guess it's the marketing department that runs the show.

            simonzerafa@infosec.exchangeS This user is from outside of this forum
            simonzerafa@infosec.exchangeS This user is from outside of this forum
            simonzerafa@infosec.exchange
            wrote last edited by
            #23

            @alexanderkjall

            That's not what the disclosure timeline claims:

            2026-03-23 Reported to Linux kernel security team
            2026-03-24 Initial acknowledgment
            2026-03-25 Patches proposed and reviewed
            2026-04-01 Patch committed to mainline
            2026-04-22 CVE-2026-31431 assigned
            2026-04-29 Public disclosure (https://copy.fail/)

            Is this timeline in error?

            waldi@chaos.socialW fun@berkeley.edu.plF noisytoot@berkeley.edu.plN 3 Replies Last reply
            0
            • penguin42@mastodon.org.ukP penguin42@mastodon.org.uk

              @alexanderkjall That feels too complicated to leave to leave just to a (potentially 1st time) reporter. I would have hoped that at the very least the LK security team would track with the reporter and remind them of the need to do the other bits regularly. Especially on a nasty one!

              fedops@fosstodon.orgF This user is from outside of this forum
              fedops@fosstodon.orgF This user is from outside of this forum
              fedops@fosstodon.org
              wrote last edited by
              #24

              @penguin42 I place some amount of blame with distro maintainers for not following up on patches released by the kernel team. I know it's not a thankful job, but it needs to be done.

              @alexanderkjall

              penguin42@mastodon.org.ukP 1 Reply Last reply
              0
              • fedops@fosstodon.orgF fedops@fosstodon.org

                @penguin42 I place some amount of blame with distro maintainers for not following up on patches released by the kernel team. I know it's not a thankful job, but it needs to be done.

                @alexanderkjall

                penguin42@mastodon.org.ukP This user is from outside of this forum
                penguin42@mastodon.org.ukP This user is from outside of this forum
                penguin42@mastodon.org.uk
                wrote last edited by
                #25

                @fedops @alexanderkjall In this case it doesn't seem to have been that simple; The backports to older kernels were only released upstream yesterday, and the CVE only got assigned a week or two back; so it's not clear if anyone new. I'd love to know if the kernel security guys told anyone there were some pending.

                fedops@fosstodon.orgF 1 Reply Last reply
                0
                • penguin42@mastodon.org.ukP penguin42@mastodon.org.uk

                  @fedops @alexanderkjall In this case it doesn't seem to have been that simple; The backports to older kernels were only released upstream yesterday, and the CVE only got assigned a week or two back; so it's not clear if anyone new. I'd love to know if the kernel security guys told anyone there were some pending.

                  fedops@fosstodon.orgF This user is from outside of this forum
                  fedops@fosstodon.orgF This user is from outside of this forum
                  fedops@fosstodon.org
                  wrote last edited by
                  #26

                  @penguin42 yeah I understand the back ports problem but there was a patch in mainlinel. The timeline says:

                  2026-03-25 Patches proposed and reviewed
                  2026-04-01 Patch committed to mainline

                  Surely "proposed and reviewed" must have caught someone's interest?

                  The sad thing is a patch wasn't even necessary. Disabling the ALG function via bootparam was completely enough except in rare cases where crypto performance actually counts.

                  @alexanderkjall

                  alexanderkjall@mastodon.socialA penguin42@mastodon.org.ukP 2 Replies Last reply
                  0
                  • fedops@fosstodon.orgF fedops@fosstodon.org

                    @penguin42 yeah I understand the back ports problem but there was a patch in mainlinel. The timeline says:

                    2026-03-25 Patches proposed and reviewed
                    2026-04-01 Patch committed to mainline

                    Surely "proposed and reviewed" must have caught someone's interest?

                    The sad thing is a patch wasn't even necessary. Disabling the ALG function via bootparam was completely enough except in rare cases where crypto performance actually counts.

                    @alexanderkjall

                    alexanderkjall@mastodon.socialA This user is from outside of this forum
                    alexanderkjall@mastodon.socialA This user is from outside of this forum
                    alexanderkjall@mastodon.social
                    wrote last edited by
                    #27

                    @fedops @penguin42 I'm not part of any distro security team, so I can't really speak for any of them.

                    But Debian contains about 40000 source packages as of may 2026, it feels slightly unrealistic that the security team are supposed to track patches for all of those and understand which ones contain important security fixes.

                    If you find a vulnerability, register a website and build an exploit, then notifying the vendors beforehand feels like a quite small thing in comparison.

                    fedops@fosstodon.orgF 1 Reply Last reply
                    0
                    • fedops@fosstodon.orgF fedops@fosstodon.org

                      @penguin42 yeah I understand the back ports problem but there was a patch in mainlinel. The timeline says:

                      2026-03-25 Patches proposed and reviewed
                      2026-04-01 Patch committed to mainline

                      Surely "proposed and reviewed" must have caught someone's interest?

                      The sad thing is a patch wasn't even necessary. Disabling the ALG function via bootparam was completely enough except in rare cases where crypto performance actually counts.

                      @alexanderkjall

                      penguin42@mastodon.org.ukP This user is from outside of this forum
                      penguin42@mastodon.org.ukP This user is from outside of this forum
                      penguin42@mastodon.org.uk
                      wrote last edited by
                      #28

                      @fedops @alexanderkjall To me it seems the delay in registering the CVE was the big problem here; if the CVE was registered, the distro people would have at least something to track (even if no one had mailed the distro list). Still it feels like each of the 3 components should be mailing the other.

                      drwho@masto.hackers.townD 1 Reply Last reply
                      0
                      • alexanderkjall@mastodon.socialA alexanderkjall@mastodon.social

                        @fedops @penguin42 I'm not part of any distro security team, so I can't really speak for any of them.

                        But Debian contains about 40000 source packages as of may 2026, it feels slightly unrealistic that the security team are supposed to track patches for all of those and understand which ones contain important security fixes.

                        If you find a vulnerability, register a website and build an exploit, then notifying the vendors beforehand feels like a quite small thing in comparison.

                        fedops@fosstodon.orgF This user is from outside of this forum
                        fedops@fosstodon.orgF This user is from outside of this forum
                        fedops@fosstodon.org
                        wrote last edited by
                        #29

                        @alexanderkjall I agree and to be clear I have very low respect for that security outfit (and most others as well). Disclosure: I work in industrial cybersec.

                        However, arguably monitoring the kernel security is the most important thing. If you have a security team in your distro crew and they're not taking a keen interest in kernel security, what are they really doing?

                        That being said a simple email to the 15 or so distros that matter would not have been too big an ask.
                        @penguin42

                        fedops@fosstodon.orgF 1 Reply Last reply
                        0
                        • alexanderkjall@mastodon.socialA alexanderkjall@mastodon.social

                          Today I have spent way too much time handling the https://copy.fail situation #copyfail

                          The persons who discovered it didn't notify the distribution security list, so no patched kernels was available for people to install when they released it.

                          But they did have time to write an exploit, and thought it was a good idea to distribute that on day one, before vendors had time to provide patches.

                          I'm not very impressed with xint.io, I guess it's the marketing department that runs the show.

                          epd5qrxx@mastodon.onlineE This user is from outside of this forum
                          epd5qrxx@mastodon.onlineE This user is from outside of this forum
                          epd5qrxx@mastodon.online
                          wrote last edited by
                          #30

                          @alexanderkjall

                          https://infosec.exchange/@wdormann/116495106231293342

                          1 Reply Last reply
                          0
                          • fedops@fosstodon.orgF fedops@fosstodon.org

                            @alexanderkjall I agree and to be clear I have very low respect for that security outfit (and most others as well). Disclosure: I work in industrial cybersec.

                            However, arguably monitoring the kernel security is the most important thing. If you have a security team in your distro crew and they're not taking a keen interest in kernel security, what are they really doing?

                            That being said a simple email to the 15 or so distros that matter would not have been too big an ask.
                            @penguin42

                            fedops@fosstodon.orgF This user is from outside of this forum
                            fedops@fosstodon.orgF This user is from outside of this forum
                            fedops@fosstodon.org
                            wrote last edited by
                            #31

                            @alexanderkjall @penguin42 fwiw I agree with gkh:
                            https://social.kernel.org/objects/e5b49e64-befb-43a8-aab3-33c7f3705a99

                            penguin42@mastodon.org.ukP 1 Reply Last reply
                            0
                            • fedops@fosstodon.orgF fedops@fosstodon.org

                              @alexanderkjall @penguin42 fwiw I agree with gkh:
                              https://social.kernel.org/objects/e5b49e64-befb-43a8-aab3-33c7f3705a99

                              penguin42@mastodon.org.ukP This user is from outside of this forum
                              penguin42@mastodon.org.ukP This user is from outside of this forum
                              penguin42@mastodon.org.uk
                              wrote last edited by
                              #32

                              @fedops @alexanderkjall Oh, that says no one contacted the security team - which contradicts what it said in the blog of the guys who found it.

                              fedops@fosstodon.orgF 1 Reply Last reply
                              0
                              • penguin42@mastodon.org.ukP penguin42@mastodon.org.uk

                                @fedops @alexanderkjall Oh, that says no one contacted the security team - which contradicts what it said in the blog of the guys who found it.

                                fedops@fosstodon.orgF This user is from outside of this forum
                                fedops@fosstodon.orgF This user is from outside of this forum
                                fedops@fosstodon.org
                                wrote last edited by
                                #33

                                @penguin42 well he says "they told us", which means the kernel team.
                                @alexanderkjall

                                penguin42@mastodon.org.ukP 1 Reply Last reply
                                0
                                • fedops@fosstodon.orgF fedops@fosstodon.org

                                  @penguin42 well he says "they told us", which means the kernel team.
                                  @alexanderkjall

                                  penguin42@mastodon.org.ukP This user is from outside of this forum
                                  penguin42@mastodon.org.ukP This user is from outside of this forum
                                  penguin42@mastodon.org.uk
                                  wrote last edited by
                                  #34

                                  @fedops @alexanderkjall Oh OK, I see, yeh they told them about the bug, but didn't tell them about the announcement. Yeh, that sucks.

                                  1 Reply Last reply
                                  0
                                  • alexanderkjall@mastodon.socialA alexanderkjall@mastodon.social

                                    Today I have spent way too much time handling the https://copy.fail situation #copyfail

                                    The persons who discovered it didn't notify the distribution security list, so no patched kernels was available for people to install when they released it.

                                    But they did have time to write an exploit, and thought it was a good idea to distribute that on day one, before vendors had time to provide patches.

                                    I'm not very impressed with xint.io, I guess it's the marketing department that runs the show.

                                    asltf@berlin.socialA This user is from outside of this forum
                                    asltf@berlin.socialA This user is from outside of this forum
                                    asltf@berlin.social
                                    wrote last edited by
                                    #35

                                    @alexanderkjall "The persons who discovered it didn't notify the distribution security list, so no patched kernels was available for people to install when they released it."

                                    Sorry, but it is not the persons responsibility to look out whom to contact.
                                    As per the linked page, he reported to Linux kernel security team on May 23nd.

                                    In my opinion it is responsibility of distributions to be in the loop of kernel security team.

                                    alexanderkjall@mastodon.socialA 1 Reply Last reply
                                    0
                                    • asltf@berlin.socialA asltf@berlin.social

                                      @alexanderkjall "The persons who discovered it didn't notify the distribution security list, so no patched kernels was available for people to install when they released it."

                                      Sorry, but it is not the persons responsibility to look out whom to contact.
                                      As per the linked page, he reported to Linux kernel security team on May 23nd.

                                      In my opinion it is responsibility of distributions to be in the loop of kernel security team.

                                      alexanderkjall@mastodon.socialA This user is from outside of this forum
                                      alexanderkjall@mastodon.socialA This user is from outside of this forum
                                      alexanderkjall@mastodon.social
                                      wrote last edited by
                                      #36

                                      @asltf Since the kernel have the policy "every bug gets a CVE" ( https://docs.kernel.org/process/cve.html ), that seems like a full time job for multiple people.

                                      They published 200 CVE's since 2026-04-24: https://lore.kernel.org/linux-cve-announce/topics_new.html

                                      I guess the security team of your favorite linux distribution would appreciate some support.

                                      1 Reply Last reply
                                      0
                                      • simonzerafa@infosec.exchangeS simonzerafa@infosec.exchange

                                        @alexanderkjall

                                        That's not what the disclosure timeline claims:

                                        2026-03-23 Reported to Linux kernel security team
                                        2026-03-24 Initial acknowledgment
                                        2026-03-25 Patches proposed and reviewed
                                        2026-04-01 Patch committed to mainline
                                        2026-04-22 CVE-2026-31431 assigned
                                        2026-04-29 Public disclosure (https://copy.fail/)

                                        Is this timeline in error?

                                        waldi@chaos.socialW This user is from outside of this forum
                                        waldi@chaos.socialW This user is from outside of this forum
                                        waldi@chaos.social
                                        wrote last edited by
                                        #37

                                        @simonzerafa @alexanderkjall Disclosure to Linux, but not to the distros.

                                        1 Reply Last reply
                                        0
                                        • simonzerafa@infosec.exchangeS simonzerafa@infosec.exchange

                                          @alexanderkjall

                                          That's not what the disclosure timeline claims:

                                          2026-03-23 Reported to Linux kernel security team
                                          2026-03-24 Initial acknowledgment
                                          2026-03-25 Patches proposed and reviewed
                                          2026-04-01 Patch committed to mainline
                                          2026-04-22 CVE-2026-31431 assigned
                                          2026-04-29 Public disclosure (https://copy.fail/)

                                          Is this timeline in error?

                                          fun@berkeley.edu.plF This user is from outside of this forum
                                          fun@berkeley.edu.plF This user is from outside of this forum
                                          fun@berkeley.edu.pl
                                          wrote last edited by
                                          #38
                                          @simonzerafa @alexanderkjall How do distros know that there is a vulnerability in the wild?
                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups