Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days.

Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days.

Scheduled Pinned Locked Moved Uncategorized
debianlinux
8 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mpjgregoire@cosocial.caM This user is from outside of this forum
    mpjgregoire@cosocial.caM This user is from outside of this forum
    mpjgregoire@cosocial.ca
    wrote last edited by
    #1

    Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days. The obvious explanation is that they're dealing with the copy.fail security hole, but I think that's been mostly resolved ( https://security-tracker.debian.org/tracker/CVE-2026-31431 ).

    Possibly copy.fail is the first of many security problems being discovered and patched.

    1/3

    virtuous_sloth@cosocial.caV mpjgregoire@cosocial.caM gemlog@friendface.kalum.caG edwing@mstdn.moimeme.caE 4 Replies Last reply
    0
    • mpjgregoire@cosocial.caM mpjgregoire@cosocial.ca

      Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days. The obvious explanation is that they're dealing with the copy.fail security hole, but I think that's been mostly resolved ( https://security-tracker.debian.org/tracker/CVE-2026-31431 ).

      Possibly copy.fail is the first of many security problems being discovered and patched.

      1/3

      virtuous_sloth@cosocial.caV This user is from outside of this forum
      virtuous_sloth@cosocial.caV This user is from outside of this forum
      virtuous_sloth@cosocial.ca
      wrote last edited by
      #2

      @mpjgregoire Dirty Frag is hot on its heals.

      mpjgregoire@cosocial.caM 1 Reply Last reply
      0
      • mpjgregoire@cosocial.caM mpjgregoire@cosocial.ca

        Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days. The obvious explanation is that they're dealing with the copy.fail security hole, but I think that's been mostly resolved ( https://security-tracker.debian.org/tracker/CVE-2026-31431 ).

        Possibly copy.fail is the first of many security problems being discovered and patched.

        1/3

        mpjgregoire@cosocial.caM This user is from outside of this forum
        mpjgregoire@cosocial.caM This user is from outside of this forum
        mpjgregoire@cosocial.ca
        wrote last edited by
        #3

        From https://tracker.debian.org/pkg/linux

        [2026-05-09] Accepted linux 6.12.86-1 (source) into proposed-updates
        [2026-05-09] Accepted linux 7.0.4-1~bpo13+1 (source) into stable-backports
        [2026-05-09] Accepted linux 6.12.86-1~bpo12+1 (source) into oldstable-backports
        [2026-05-09] Accepted linux 6.1.170-3 (source) into oldstable-security
        [2026-05-09] Accepted linux 6.1.170-2 (source) into oldstable-security
        [2026-05-08] Accepted linux 6.12.86-1 (source) into stable-security

        2/3

        mpjgregoire@cosocial.caM 1 Reply Last reply
        0
        • mpjgregoire@cosocial.caM mpjgregoire@cosocial.ca

          From https://tracker.debian.org/pkg/linux

          [2026-05-09] Accepted linux 6.12.86-1 (source) into proposed-updates
          [2026-05-09] Accepted linux 7.0.4-1~bpo13+1 (source) into stable-backports
          [2026-05-09] Accepted linux 6.12.86-1~bpo12+1 (source) into oldstable-backports
          [2026-05-09] Accepted linux 6.1.170-3 (source) into oldstable-security
          [2026-05-09] Accepted linux 6.1.170-2 (source) into oldstable-security
          [2026-05-08] Accepted linux 6.12.86-1 (source) into stable-security

          2/3

          mpjgregoire@cosocial.caM This user is from outside of this forum
          mpjgregoire@cosocial.caM This user is from outside of this forum
          mpjgregoire@cosocial.ca
          wrote last edited by
          #4

          [2026-05-08] Accepted linux 5.10.251-4 (source) into oldoldstable-security
          [2026-05-07] Accepted linux 7.0.4-1 (source) into unstable
          [2026-05-07] Accepted linux 7.1~rc2-1~exp1 (source) into experimental
          [2026-05-05] Accepted linux 6.19.14-1~bpo13+1 (source) into stable-backports
          [2026-05-02] Accepted linux 6.1.170-1 (source) into oldstable-proposed-updates

          3/3

          1 Reply Last reply
          0
          • virtuous_sloth@cosocial.caV virtuous_sloth@cosocial.ca

            @mpjgregoire Dirty Frag is hot on its heals.

            mpjgregoire@cosocial.caM This user is from outside of this forum
            mpjgregoire@cosocial.caM This user is from outside of this forum
            mpjgregoire@cosocial.ca
            wrote last edited by
            #5

            @virtuous_sloth Is that so? First I've heard of it.

            virtuous_sloth@cosocial.caV 1 Reply Last reply
            0
            • mpjgregoire@cosocial.caM mpjgregoire@cosocial.ca

              Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days. The obvious explanation is that they're dealing with the copy.fail security hole, but I think that's been mostly resolved ( https://security-tracker.debian.org/tracker/CVE-2026-31431 ).

              Possibly copy.fail is the first of many security problems being discovered and patched.

              1/3

              gemlog@friendface.kalum.caG This user is from outside of this forum
              gemlog@friendface.kalum.caG This user is from outside of this forum
              gemlog@friendface.kalum.ca
              wrote last edited by
              #6

              @mpjgregoire It's yet another one:
              Another Linux kernel vulnerability has been published under number CVE-2026-43284, nicknamed Dirty Frag.
              Fixed kernels compiled by the Debian community have already been published for Debian 12 and 13

              1 Reply Last reply
              0
              • mpjgregoire@cosocial.caM mpjgregoire@cosocial.ca

                @virtuous_sloth Is that so? First I've heard of it.

                virtuous_sloth@cosocial.caV This user is from outside of this forum
                virtuous_sloth@cosocial.caV This user is from outside of this forum
                virtuous_sloth@cosocial.ca
                wrote last edited by
                #7

                @mpjgregoire Yup. And I think the person who found it (presumably using an LLM) posted about it without doing responsible disclosure, so patches or at least built kernels are not yet produced and the only thing to do is disable some kernel modules to mitigate the possibility of local privilege escalation.

                1 Reply Last reply
                0
                • mpjgregoire@cosocial.caM mpjgregoire@cosocial.ca

                  Hmmm. #Debian is stepping on the gas with #Linux kernel updates these days. The obvious explanation is that they're dealing with the copy.fail security hole, but I think that's been mostly resolved ( https://security-tracker.debian.org/tracker/CVE-2026-31431 ).

                  Possibly copy.fail is the first of many security problems being discovered and patched.

                  1/3

                  edwing@mstdn.moimeme.caE This user is from outside of this forum
                  edwing@mstdn.moimeme.caE This user is from outside of this forum
                  edwing@mstdn.moimeme.ca
                  wrote last edited by
                  #8

                  @mpjgregoire There’s three kernel vulnerabilities that are being patched: Copy Fail, Dirty Frag and a third one I don’t know the name of.

                  There’s a lot of discussion about it on oss-security this month:

                  https://www.openwall.com/lists/oss-security/2026/05/

                  1 Reply Last reply
                  1
                  0
                  • R relay@relay.mycrowd.ca shared this topic
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups