Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Ah, the #copyfail clickbait posts are coming.

Ah, the #copyfail clickbait posts are coming.

Scheduled Pinned Locked Moved Uncategorized
copyfail
50 Posts 22 Posters 3 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

    Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

    initcall_blacklist=algif_aead_init

    to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

    # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

    This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

    1/4

    sorro@woof.techS This user is from outside of this forum
    sorro@woof.techS This user is from outside of this forum
    sorro@woof.tech
    wrote last edited by
    #32

    @jwildeboer since android runs with the linux kernel, is android also affected?

    jwildeboer@social.wildeboer.netJ caravantraveller@social.cologneC 2 Replies Last reply
    0
    • flxtr@social.tchncs.deF flxtr@social.tchncs.de

      @Larvitz Edit: removed unhelpful cheap joke. I'm sorry. Will try harder to resist next time.
      @jwildeboer

      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
      jwildeboer@social.wildeboer.net
      wrote last edited by
      #33

      @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess 😞

      flxtr@social.tchncs.deF larvitz@burningboard.netL 2 Replies Last reply
      0
      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

        @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess 😞

        flxtr@social.tchncs.deF This user is from outside of this forum
        flxtr@social.tchncs.deF This user is from outside of this forum
        flxtr@social.tchncs.de
        wrote last edited by
        #34

        @jwildeboer I'm sorry. You're right. Should have posted the cheap joke in my own feed.
        @Larvitz

        1 Reply Last reply
        0
        • sorro@woof.techS sorro@woof.tech

          @jwildeboer since android runs with the linux kernel, is android also affected?

          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
          jwildeboer@social.wildeboer.net
          wrote last edited by
          #35

          @Sorro I don't know. Depends if `algif_aead` is compiled into the kernel or loaded as module, if it is present at all in Android kernels. If somebody has checked, please do reply.

          H 1 Reply Last reply
          0
          • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

            Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

            initcall_blacklist=algif_aead_init

            to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

            # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

            This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

            1/4

            psyhackological@fosstodon.orgP This user is from outside of this forum
            psyhackological@fosstodon.orgP This user is from outside of this forum
            psyhackological@fosstodon.org
            wrote last edited by
            #36

            @jwildeboer what about those who cannot be downtimed to reboot?

            jwildeboer@social.wildeboer.netJ 1 Reply Last reply
            0
            • echopapa@social.tchncs.deE echopapa@social.tchncs.de

              @larsmb

              Debian:

              CVE-2026-31431

              favicon

              (security-tracker.debian.org)

              @jwildeboer

              ikket@mementomori.socialI This user is from outside of this forum
              ikket@mementomori.socialI This user is from outside of this forum
              ikket@mementomori.social
              wrote last edited by
              #37

              @echopapa @larsmb @jwildeboer alma (yay the new centos model 🎉) https://almalinux.org/blog/2026-05-01-cve-2026-31431-copy-fail/

              1 Reply Last reply
              0
              • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                initcall_blacklist=algif_aead_init

                to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                1/4

                moses_izumi@fe.disroot.orgM This user is from outside of this forum
                moses_izumi@fe.disroot.orgM This user is from outside of this forum
                moses_izumi@fe.disroot.org
                wrote last edited by
                #38
                @jwildeboer
                There's a special place in hell for security researchers who obfuscate their proof-of-concept exploit code.
                1 Reply Last reply
                0
                • sorro@woof.techS sorro@woof.tech

                  @jwildeboer since android runs with the linux kernel, is android also affected?

                  caravantraveller@social.cologneC This user is from outside of this forum
                  caravantraveller@social.cologneC This user is from outside of this forum
                  caravantraveller@social.cologne
                  wrote last edited by
                  #39

                  @Sorro @jwildeboer

                  Are there any users on your Android phone who might take advantage of #copyfail ?

                  For single-user systems there is no problem, because it's not a remote exploit.

                  sorro@woof.techS 1 Reply Last reply
                  0
                  • R relay@relay.infosec.exchange shared this topic
                  • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                    @flxtr @Larvitz I really try hard to make this thread helpful and pragmatic, but boys gotta be boys I guess 😞

                    larvitz@burningboard.netL This user is from outside of this forum
                    larvitz@burningboard.netL This user is from outside of this forum
                    larvitz@burningboard.net
                    wrote last edited by
                    #40

                    @jwildeboer @flxtr Deleted it. Sorry, could not help myself and thought "Galgenhumor" could help make this serious topic a bit more relaxed.

                    1 Reply Last reply
                    0
                    • psyhackological@fosstodon.orgP psyhackological@fosstodon.org

                      @jwildeboer what about those who cannot be downtimed to reboot?

                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                      jwildeboer@social.wildeboer.net
                      wrote last edited by
                      #41

                      @psyhackological They'll have to do a risk calculation. It is a local user exploit, so in most cases when you freeze the current software deployment, you should be safe until the kernel patches have arrived. In general, though, your contingency plans should ALWAYS make reboots possible.

                      psyhackological@fosstodon.orgP 1 Reply Last reply
                      0
                      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                        @psyhackological They'll have to do a risk calculation. It is a local user exploit, so in most cases when you freeze the current software deployment, you should be safe until the kernel patches have arrived. In general, though, your contingency plans should ALWAYS make reboots possible.

                        psyhackological@fosstodon.orgP This user is from outside of this forum
                        psyhackological@fosstodon.orgP This user is from outside of this forum
                        psyhackological@fosstodon.org
                        wrote last edited by
                        #42

                        @jwildeboer from what I read isn't this about removing kernel module? I think this keeps the system running without a reboot

                        echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
                        rmmod algif_aead

                        Don't know what will happen when it reboots though so I would stick to your plan.

                        jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                        0
                        • psyhackological@fosstodon.orgP psyhackological@fosstodon.org

                          @jwildeboer from what I read isn't this about removing kernel module? I think this keeps the system running without a reboot

                          echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
                          rmmod algif_aead

                          Don't know what will happen when it reboots though so I would stick to your plan.

                          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                          jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                          jwildeboer@social.wildeboer.net
                          wrote last edited by
                          #43

                          @psyhackological Depends on your distribution. Some have it as module, some have it directly compiled into the kernel.

                          psyhackological@fosstodon.orgP 1 Reply Last reply
                          0
                          • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                            @Sorro I don't know. Depends if `algif_aead` is compiled into the kernel or loaded as module, if it is present at all in Android kernels. If somebody has checked, please do reply.

                            H This user is from outside of this forum
                            H This user is from outside of this forum
                            hokid@mastodon.social
                            wrote last edited by
                            #44

                            @jwildeboer @Sorro It's a bit hard to say because of the many, many flavors of Android in the wild, but it is very likely not affected for various reasons: by default, SELinux is configured to not allow alg_socket for sandboxed apps (see https://android.googlesource.com/platform/system/sepolicy/+/refs/tags/android-16.0.0_r4/private/app_neverallows.te#141), there are usually no suid binaries on Android, and algif_aead is usually not provided in the first place. Of course, a very old Android version might be affected, but in that case, you're open to various other exploits anyway...

                            1 Reply Last reply
                            0
                            • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                              @psyhackological Depends on your distribution. Some have it as module, some have it directly compiled into the kernel.

                              psyhackological@fosstodon.orgP This user is from outside of this forum
                              psyhackological@fosstodon.orgP This user is from outside of this forum
                              psyhackological@fosstodon.org
                              wrote last edited by
                              #45

                              @jwildeboer we're on Ubuntu. Yiakes then... So it needs to be checked otherwise.

                              1 Reply Last reply
                              0
                              • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                                initcall_blacklist=algif_aead_init

                                to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                                # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                                This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                                1/4

                                sstendahl@floss.socialS This user is from outside of this forum
                                sstendahl@floss.socialS This user is from outside of this forum
                                sstendahl@floss.social
                                wrote last edited by
                                #46

                                @jwildeboer thanks for the post. To add, also keep on eye on which distro have patched the mitigation, Fedora patched it a week ago or so iirc, Fedora 44 doesn’t have the exploit at all. Neither does anything about running the 7.x kernel.

                                jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                                0
                                • sstendahl@floss.socialS sstendahl@floss.social

                                  @jwildeboer thanks for the post. To add, also keep on eye on which distro have patched the mitigation, Fedora patched it a week ago or so iirc, Fedora 44 doesn’t have the exploit at all. Neither does anything about running the 7.x kernel.

                                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                  jwildeboer@social.wildeboer.net
                                  wrote last edited by
                                  #47

                                  @sstendahl Yes, that's in the second post of my thread, with links 🙂 https://social.wildeboer.net/@jwildeboer/116503831839617808

                                  1 Reply Last reply
                                  0
                                  • caravantraveller@social.cologneC caravantraveller@social.cologne

                                    @Sorro @jwildeboer

                                    Are there any users on your Android phone who might take advantage of #copyfail ?

                                    For single-user systems there is no problem, because it's not a remote exploit.

                                    sorro@woof.techS This user is from outside of this forum
                                    sorro@woof.techS This user is from outside of this forum
                                    sorro@woof.tech
                                    wrote last edited by
                                    #48

                                    @caravantraveller @jwildeboer ooh, i didnt really understand much about the exploit so i thought it was a remote exploit. that's a relief for me even for my linux laptop

                                    thanks for telling me!

                                    1 Reply Last reply
                                    0
                                    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                      Ah, the #copyfail clickbait posts are coming. Here’s my contribution. On your Linux machine add

                                      initcall_blacklist=algif_aead_init

                                      to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

                                      # grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

                                      This mitigation comes courtesy of Red Hat. Our engineers keep you safe 🙂

                                      1/4

                                      leah@blahaj.socialL This user is from outside of this forum
                                      leah@blahaj.socialL This user is from outside of this forum
                                      leah@blahaj.social
                                      wrote last edited by
                                      #49

                                      @jwildeboer I think this only works when the module is builtin (as on RHEL, but not many others).

                                      jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                                      0
                                      • leah@blahaj.socialL leah@blahaj.social

                                        @jwildeboer I think this only works when the module is builtin (as on RHEL, but not many others).

                                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                                        jwildeboer@social.wildeboer.net
                                        wrote last edited by
                                        #50

                                        @leah It should still work, as initcall_blacklist on init functions works regardless of it being a module or compiled in. I don't have a machine with it built as a module at hand, nor do I have the time to spin one up and check. If somebody else could help here and share the result, much appreciated.

                                        1 Reply Last reply
                                        0
                                        • R relay@relay.mycrowd.ca shared this topic
                                        Reply
                                        • Reply as topic
                                        Log in to reply
                                        • Oldest to Newest
                                        • Newest to Oldest
                                        • Most Votes


                                        • Login

                                        • Login or register to search.
                                        • First post
                                          Last post
                                        0
                                        • Categories
                                        • Recent
                                        • Tags
                                        • Popular
                                        • World
                                        • Users
                                        • Groups