Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Ah, the #copyfail clickbait posts are coming.

Ah, the #copyfail clickbait posts are coming.

Scheduled Pinned Locked Moved Uncategorized
copyfail
50 Posts 22 Posters 3 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • blindcoder@toot.berlinB blindcoder@toot.berlin

    @jwildeboer Thank you for this! ❤
    One question, if I understand that correctly it's a local privilege escalation, right?
    So assuming there's no RCE present elsewhere, and I'm the only account on the system, I can relax about CopyFail?

    leeloo@c.imL This user is from outside of this forum
    leeloo@c.imL This user is from outside of this forum
    leeloo@c.im
    wrote last edited by
    #25

    @blindcoder @jwildeboer
    It appears so.

    As long as by "system" you mean hardware and not a container (e.g. docker).

    1 Reply Last reply
    0
    • larsmb@mastodon.onlineL larsmb@mastodon.online

      @jwildeboer I'm confused somewhat by how distros didn't pick it up, looks like some don't have representatives on the kernel list?

      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
      jwildeboer@social.wildeboer.net
      wrote last edited by
      #26

      @larsmb Could be. I guess the topic is a bit more complex. Some distros have `algif_aead` as module, so you can do the big hammer approach and `rmmod` it, other distros have `algif_aead` compiled into the kernel, so you need a more surgical approach, like the one I described. The surgical approach however has the advantage of working for both setups.

      1 Reply Last reply
      0
      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

        The TL;DR of #CopyFail in my opinion: Due to an unusual (I personally think irresponsible) disclosure, we sysadmins are now dealing with having to push out an immediate mitigation until the updated kernel packages become available. I am trying to help in a pragmatic way. This too will pass, but it also shows that running Linux servers comes with responsibilities to protect your machines and users.

        4/4

        jwp@cloudisland.nzJ This user is from outside of this forum
        jwp@cloudisland.nzJ This user is from outside of this forum
        jwp@cloudisland.nz
        wrote last edited by
        #27

        @jwildeboer
        Tbf whilst It's not great, its AT LEAST not remotely exploitable. Problematic if your workload runs untrusted stuff from external sources directly, absolutely. But likewise not quite as sky is falling as some have seemed to make it out to be.

        1 Reply Last reply
        0
        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

          The TL;DR of #CopyFail in my opinion: Due to an unusual (I personally think irresponsible) disclosure, we sysadmins are now dealing with having to push out an immediate mitigation until the updated kernel packages become available. I am trying to help in a pragmatic way. This too will pass, but it also shows that running Linux servers comes with responsibilities to protect your machines and users.

          4/4

          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
          jwildeboer@social.wildeboer.net
          wrote last edited by
          #28

          ADDENDUM: Now also a blog post at https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/

          tris@chaos.socialT 1 Reply Last reply
          1
          0
          • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

            ADDENDUM: Now also a blog post at https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/

            tris@chaos.socialT This user is from outside of this forum
            tris@chaos.socialT This user is from outside of this forum
            tris@chaos.social
            wrote last edited by
            #29

            @jwildeboer Nice! Btw wiki page is up: https://en.wikipedia.org/wiki/Copy_Fail 🙂

            1 Reply Last reply
            0
            • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

              Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

              initcall_blacklist=algif_aead_init

              to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

              # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

              This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

              1/4

              Link Preview Image
              larvitz@burningboard.netL This user is from outside of this forum
              larvitz@burningboard.netL This user is from outside of this forum
              larvitz@burningboard.net
              wrote last edited by
              #30
              This post is deleted!
              flxtr@social.tchncs.deF 1 Reply Last reply
              0
              • larvitz@burningboard.netL larvitz@burningboard.net

                This post is deleted!

                flxtr@social.tchncs.deF This user is from outside of this forum
                flxtr@social.tchncs.deF This user is from outside of this forum
                flxtr@social.tchncs.de
                wrote last edited by
                #31

                @Larvitz Edit: removed unhelpful cheap joke. I'm sorry. Will try harder to resist next time.
                @jwildeboer

                jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                0
                • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                  Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                  initcall_blacklist=algif_aead_init

                  to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                  # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                  This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                  1/4

                  Link Preview Image
                  sorro@woof.techS This user is from outside of this forum
                  sorro@woof.techS This user is from outside of this forum
                  sorro@woof.tech
                  wrote last edited by
                  #32

                  @jwildeboer since android runs with the linux kernel, is android also affected?

                  jwildeboer@social.wildeboer.netJ caravantraveller@social.cologneC 2 Replies Last reply
                  0
                  • flxtr@social.tchncs.deF flxtr@social.tchncs.de

                    @Larvitz Edit: removed unhelpful cheap joke. I'm sorry. Will try harder to resist next time.
                    @jwildeboer

                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                    jwildeboer@social.wildeboer.net
                    wrote last edited by
                    #33

                    @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess 😞

                    flxtr@social.tchncs.deF larvitz@burningboard.netL 2 Replies Last reply
                    0
                    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                      @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess 😞

                      flxtr@social.tchncs.deF This user is from outside of this forum
                      flxtr@social.tchncs.deF This user is from outside of this forum
                      flxtr@social.tchncs.de
                      wrote last edited by
                      #34

                      @jwildeboer I'm sorry. You're right. Should have posted the cheap joke in my own feed.
                      @Larvitz

                      1 Reply Last reply
                      0
                      • sorro@woof.techS sorro@woof.tech

                        @jwildeboer since android runs with the linux kernel, is android also affected?

                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                        jwildeboer@social.wildeboer.net
                        wrote last edited by
                        #35

                        @Sorro I don't know. Depends if `algif_aead` is compiled into the kernel or loaded as module, if it is present at all in Android kernels. If somebody has checked, please do reply.

                        H 1 Reply Last reply
                        0
                        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                          Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                          initcall_blacklist=algif_aead_init

                          to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                          # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                          This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                          1/4

                          Link Preview Image
                          psyhackological@fosstodon.orgP This user is from outside of this forum
                          psyhackological@fosstodon.orgP This user is from outside of this forum
                          psyhackological@fosstodon.org
                          wrote last edited by
                          #36

                          @jwildeboer what about those who cannot be downtimed to reboot?

                          jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                          0
                          • echopapa@social.tchncs.deE echopapa@social.tchncs.de

                            @larsmb

                            Debian:

                            CVE-2026-31431

                            favicon

                            (security-tracker.debian.org)

                            @jwildeboer

                            ikket@mementomori.socialI This user is from outside of this forum
                            ikket@mementomori.socialI This user is from outside of this forum
                            ikket@mementomori.social
                            wrote last edited by
                            #37

                            @echopapa @larsmb @jwildeboer alma (yay the new centos model 🎉) https://almalinux.org/blog/2026-05-01-cve-2026-31431-copy-fail/

                            1 Reply Last reply
                            0
                            • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                              Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                              initcall_blacklist=algif_aead_init

                              to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                              # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                              This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                              1/4

                              Link Preview Image
                              moses_izumi@fe.disroot.orgM This user is from outside of this forum
                              moses_izumi@fe.disroot.orgM This user is from outside of this forum
                              moses_izumi@fe.disroot.org
                              wrote last edited by
                              #38
                              @jwildeboer
                              There's a special place in hell for security researchers who obfuscate their proof-of-concept exploit code.
                              1 Reply Last reply
                              0
                              • sorro@woof.techS sorro@woof.tech

                                @jwildeboer since android runs with the linux kernel, is android also affected?

                                caravantraveller@social.cologneC This user is from outside of this forum
                                caravantraveller@social.cologneC This user is from outside of this forum
                                caravantraveller@social.cologne
                                wrote last edited by
                                #39

                                @Sorro @jwildeboer

                                Are there any users on your Android phone who might take advantage of #copyfail ?

                                For single-user systems there is no problem, because it's not a remote exploit.

                                sorro@woof.techS 1 Reply Last reply
                                0
                                • R relay@relay.infosec.exchange shared this topic
                                • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                  @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess 😞

                                  larvitz@burningboard.netL This user is from outside of this forum
                                  larvitz@burningboard.netL This user is from outside of this forum
                                  larvitz@burningboard.net
                                  wrote last edited by
                                  #40

                                  @jwildeboer @flxtr Deleted it. Sorry, could not help myself and thought "Galgenhumor" could help make this serious topic a bit more relaxed.

                                  1 Reply Last reply
                                  0
                                  • psyhackological@fosstodon.orgP psyhackological@fosstodon.org

                                    @jwildeboer what about those who cannot be downtimed to reboot?

                                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                    jwildeboer@social.wildeboer.net
                                    wrote last edited by
                                    #41

                                    @psyhackological They'll have to do a risk calculation. It is a local user exploit, so in most cases when you freeze the current software deployment, you should be safe until the kernel patches have arrived. In general, though, your contingency plans should ALWAYS make reboots possible.

                                    psyhackological@fosstodon.orgP 1 Reply Last reply
                                    0
                                    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                      @psyhackological They'll have to do a risk calculation. It is a local user exploit, so in most cases when you freeze the current software deployment, you should be safe until the kernel patches have arrived. In general, though, your contingency plans should ALWAYS make reboots possible.

                                      psyhackological@fosstodon.orgP This user is from outside of this forum
                                      psyhackological@fosstodon.orgP This user is from outside of this forum
                                      psyhackological@fosstodon.org
                                      wrote last edited by
                                      #42

                                      @jwildeboer from what I read isn't this about removing kernel module? I think this keeps the system running without a reboot

                                      echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
                                      rmmod algif_aead

                                      Don't know what will happen when it reboots though so I would stick to your plan.

                                      jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                                      0
                                      • psyhackological@fosstodon.orgP psyhackological@fosstodon.org

                                        @jwildeboer from what I read isn't this about removing kernel module? I think this keeps the system running without a reboot

                                        echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
                                        rmmod algif_aead

                                        Don't know what will happen when it reboots though so I would stick to your plan.

                                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                        jwildeboer@social.wildeboer.net
                                        wrote last edited by
                                        #43

                                        @psyhackological Depends on your distribution. Some have it as module, some have it directly compiled into the kernel.

                                        psyhackological@fosstodon.orgP 1 Reply Last reply
                                        0
                                        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                          @Sorro I don't know. Depends if `algif_aead` is compiled into the kernel or loaded as module, if it is present at all in Android kernels. If somebody has checked, please do reply.

                                          H This user is from outside of this forum
                                          H This user is from outside of this forum
                                          hokid@mastodon.social
                                          wrote last edited by
                                          #44

                                          @jwildeboer @Sorro It's a bit hard to say because of the many, many flavors of Android in the wild, but it is very likely not affected for various reasons: by default, SELinux is configured to not allow alg_socket for sandboxed apps (see https://android.googlesource.com/platform/system/sepolicy/+/refs/tags/android-16.0.0_r4/private/app_neverallows.te#141), there are usually no suid binaries on Android, and algif_aead is usually not provided in the first place. Of course, a very old Android version might be affected, but in that case, you're open to various other exploits anyway...

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups