Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. So CopyFail CVE-2026-31431 is a thing.

So CopyFail CVE-2026-31431 is a thing.

Scheduled Pinned Locked Moved Uncategorized
174 Posts 63 Posters 14 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gregkh@social.kernel.orgG gregkh@social.kernel.org
    @penguin42 @deftpunk @joshbressers @wdormann @Viss I honestly don't remember, and if I did, we don't publish who asked for CVE ids from us as that's generally not a good idea to do so (and is not a requirement for being a CNA).
    penguin42@mastodon.org.ukP This user is from outside of this forum
    penguin42@mastodon.org.ukP This user is from outside of this forum
    penguin42@mastodon.org.uk
    wrote last edited by
    #88

    @gregkh @deftpunk @joshbressers @wdormann @Viss Hmm OK - tbh I think that gap to the CVE being issued is the biggest thing here (says he on the outside), if that was issued earlier I think there would have been a better chance a distro might have noticed. So perhaps if linux-security makes sure it reminds reporters to do it, and also asks them to give you a heads up before any announcement that might have helped here.

    1 Reply Last reply
    0
    • gregkh@social.kernel.orgG gregkh@social.kernel.org
      @joshbressers @wdormann @deftpunk @Viss What do you mean, they told us, we fixed it, it got in some stable kernels, and so our work on the security team was done. The CVE team assigned a CVE after a while, and even gave it a CVSS score.

      The fact that no distro popped up that used older kernel versions to do the real work to backport to older kernels seems to be everyone's major problem here. That is outside of the kernel security team's work entirely. So take it up with the distros that people are paying support for to do this for them?

      And yes, Debian was vulnerable, that is not good, and once it was noticed people worked hard and quickly to fix that. Not bad for a community-based distro that no one pays for in my opinion.
      corsac@mastodon.socialC This user is from outside of this forum
      corsac@mastodon.socialC This user is from outside of this forum
      corsac@mastodon.social
      wrote last edited by
      #89

      @gregkh @deftpunk @joshbressers @wdormann @Viss I think we (the distro security teams, speaking as a member of the Debian one) would have liked a heads up, including maybe to help backporting to the stable kernel we run. We didn't have that heads up, we discovered the thing like everyone else.

      corsac@mastodon.socialC 1 Reply Last reply
      0
      • corsac@mastodon.socialC corsac@mastodon.social

        @gregkh @deftpunk @joshbressers @wdormann @Viss I think we (the distro security teams, speaking as a member of the Debian one) would have liked a heads up, including maybe to help backporting to the stable kernel we run. We didn't have that heads up, we discovered the thing like everyone else.

        corsac@mastodon.socialC This user is from outside of this forum
        corsac@mastodon.socialC This user is from outside of this forum
        corsac@mastodon.social
        wrote last edited by
        #90

        @gregkh @deftpunk @joshbressers @wdormann @Viss

        As Greg mentioned, vulnerability coordination is difficult, and it's hard to draw a line about who to include and who not to.

        Maybe the researchers thought they did the right thing by notifying the kernel security team (and they did), and they thought it was enough. But I don't think it's written anywhere that the kernel security team will coordinate with downstream (or anyone else), and again I'm not sure it's really possible.

        corsac@mastodon.socialC 1 Reply Last reply
        0
        • corsac@mastodon.socialC corsac@mastodon.social

          @gregkh @deftpunk @joshbressers @wdormann @Viss

          As Greg mentioned, vulnerability coordination is difficult, and it's hard to draw a line about who to include and who not to.

          Maybe the researchers thought they did the right thing by notifying the kernel security team (and they did), and they thought it was enough. But I don't think it's written anywhere that the kernel security team will coordinate with downstream (or anyone else), and again I'm not sure it's really possible.

          corsac@mastodon.socialC This user is from outside of this forum
          corsac@mastodon.socialC This user is from outside of this forum
          corsac@mastodon.social
          wrote last edited by
          #91

          @gregkh @deftpunk @joshbressers @wdormann @Viss
          Still, it leaves a bit of a bitter taste. Not sure how we can do better though.

          aissen@social.treehouse.systemsA 1 Reply Last reply
          0
          • gregkh@social.kernel.orgG gregkh@social.kernel.org
            @wdormann @joshbressers @Viss I love it how people think that "coordination of vulnerabilities" is actually something that can be done these days. Think of just who uses the software in question, and who should, and should not, be on such a list to get a "early disclosure notification".

            As I have said for quite some time now, all early-disclosure lists are leaks, otherwise why would your government allow them to be in existence?

            Software, and specifically open source software, runs the world. So should the whole world be on that notification list? 🙂
            zmanion@infosec.exchangeZ This user is from outside of this forum
            zmanion@infosec.exchangeZ This user is from outside of this forum
            zmanion@infosec.exchange
            wrote last edited by
            #92

            @gregkh @joshbressers @wdormann @Viss so there's absolutely no middle ground? When there is clearly a bug with security impact, give the distros list a week notice (two weeks max, per their policy). If it leaks, outcome is no worse than not notifying distros. The researcher can even do it instead of the kernel. At scale (Linux!) this seems like a Pareto distribution: major distros cover disproportionally most users.

            gregkh@social.kernel.orgG 1 Reply Last reply
            0
            • corsac@mastodon.socialC corsac@mastodon.social

              @gregkh @deftpunk @joshbressers @wdormann @Viss
              Still, it leaves a bit of a bitter taste. Not sure how we can do better though.

              aissen@social.treehouse.systemsA This user is from outside of this forum
              aissen@social.treehouse.systemsA This user is from outside of this forum
              aissen@social.treehouse.systems
              wrote last edited by
              #93

              @corsac
              > Not sure how we can do better though

              A random idea, not sure how far it is from what you already do:
              Bump automation where packages from latest stable branches are built and available with no human intervention in specific repositories. Manual promotion for generic repos should be as effortless as possible.

              corsac@mastodon.socialC 1 Reply Last reply
              0
              • aissen@social.treehouse.systemsA aissen@social.treehouse.systems

                @corsac
                > Not sure how we can do better though

                A random idea, not sure how far it is from what you already do:
                Bump automation where packages from latest stable branches are built and available with no human intervention in specific repositories. Manual promotion for generic repos should be as effortless as possible.

                corsac@mastodon.socialC This user is from outside of this forum
                corsac@mastodon.socialC This user is from outside of this forum
                corsac@mastodon.social
                wrote last edited by
                #94

                @Aissen The process is already pretty scripted but there's still some manual things to do (whether in the kernel packaging or in the DSA processing).

                On Apr 30th v6.12.85 was tagged at 1116Z and the DSA was sent at 2005Z. I'm unsure we can do much faster.

                note: I didn't do anything this time, it's mainly the work of Salvatore Bonaccorso (as a volunteer): https://salsa.debian.org/kernel-team/linux/-/merge_requests/1895

                1 Reply Last reply
                0
                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                  @letoams @CliffsEsport
                  Up-to-date Fedora (42 or later) are not affected at the time of publication (Yesterday).
                  At least on this Fedora 42 system, the kernel was built on April 23 and in stable 2 days ago. Not a few hours ago.

                  letoams@defcon.socialL This user is from outside of this forum
                  letoams@defcon.socialL This user is from outside of this forum
                  letoams@defcon.social
                  wrote last edited by
                  #95

                  @wdormann weird because I had a successful test on up to date f42 yesterday …

                  wdormann@infosec.exchangeW 1 Reply Last reply
                  0
                  • letoams@defcon.socialL letoams@defcon.social

                    @wdormann weird because I had a successful test on up to date f42 yesterday …

                    wdormann@infosec.exchangeW This user is from outside of this forum
                    wdormann@infosec.exchangeW This user is from outside of this forum
                    wdormann@infosec.exchange
                    wrote last edited by
                    #96

                    @letoams
                    Got a snapshot that you can revert to?
                    I'd like to see the evidence (along with showing the current kernel version).

                    letoams@defcon.socialL 1 Reply Last reply
                    0
                    • zmanion@infosec.exchangeZ zmanion@infosec.exchange

                      @gregkh @joshbressers @wdormann @Viss so there's absolutely no middle ground? When there is clearly a bug with security impact, give the distros list a week notice (two weeks max, per their policy). If it leaks, outcome is no worse than not notifying distros. The researcher can even do it instead of the kernel. At scale (Linux!) this seems like a Pareto distribution: major distros cover disproportionally most users.

                      gregkh@social.kernel.orgG This user is from outside of this forum
                      gregkh@social.kernel.orgG This user is from outside of this forum
                      gregkh@social.kernel.org
                      wrote last edited by
                      #97
                      @zmanion @joshbressers @wdormann @Viss Why is linux-distros somehow "special" enough to get these types of announcements and not everyone else? How exactly would you explain that to your favorite government entity?
                      zmanion@infosec.exchangeZ 1 Reply Last reply
                      0
                      • wdormann@infosec.exchangeW wdormann@infosec.exchange

                        @letoams
                        Got a snapshot that you can revert to?
                        I'd like to see the evidence (along with showing the current kernel version).

                        letoams@defcon.socialL This user is from outside of this forum
                        letoams@defcon.socialL This user is from outside of this forum
                        letoams@defcon.social
                        wrote last edited by
                        #98

                        @wdormann it seemed my VM was on 6.18.7–100 and hadn’t pulled in the updates yet

                        1 Reply Last reply
                        0
                        • wdormann@infosec.exchangeW wdormann@infosec.exchange

                          There's also a C version of it that works quite well. Even supports aarch64.

                          Link Preview Image
                          wdormann@infosec.exchangeW This user is from outside of this forum
                          wdormann@infosec.exchangeW This user is from outside of this forum
                          wdormann@infosec.exchange
                          wrote last edited by
                          #99

                          The CEO of Theori / Xint has a damage-control thread explaining why they chose to release the vulnerability details in a way that left all of the Linux distros in the dark.

                          TL;DR: With AI in the mix, the old way of coordinating vulnerabilities doesn't scale anymore.

                          renerebe@chaos.socialR aristot73@infosec.exchangeA cirio@infosec.exchangeC slater450413@infosec.exchangeS jc0f0116@infosec.exchangeJ 5 Replies Last reply
                          0
                          • wdormann@infosec.exchangeW wdormann@infosec.exchange

                            @k8ie
                            Yes, it's clear that it was published as a "Look at us!" vehicle.

                            But their abysmally bad coordination put every Linux user on the planet at risk, and is clear evidence that they don't care about anybody other than themselves.

                            tezoatlipoca@mas.toT This user is from outside of this forum
                            tezoatlipoca@mas.toT This user is from outside of this forum
                            tezoatlipoca@mas.to
                            wrote last edited by
                            #100

                            @wdormann @k8ie From what I've seen having been volunteered to be our infosec d00d, quarterbacking a coordination of affected downstream parties can sometimes be a big PITA. But no familiarity with the linux kernel CVD process - I presume its not as onerous as these guys are claiming?

                            Like.. isn't there a dist.list/channel that all distro maintainers hang out on? call a meeting, answer questions, set a timetable, take minutes... pain yes but not that hard..?

                            1 Reply Last reply
                            0
                            • wdormann@infosec.exchangeW wdormann@infosec.exchange

                              The CEO of Theori / Xint has a damage-control thread explaining why they chose to release the vulnerability details in a way that left all of the Linux distros in the dark.

                              TL;DR: With AI in the mix, the old way of coordinating vulnerabilities doesn't scale anymore.

                              renerebe@chaos.socialR This user is from outside of this forum
                              renerebe@chaos.socialR This user is from outside of this forum
                              renerebe@chaos.social
                              wrote last edited by
                              #101

                              @wdormann TL;DR: lame AI excuse award for laziness and incompetence

                              wdormann@infosec.exchangeW 1 Reply Last reply
                              0
                              • renerebe@chaos.socialR renerebe@chaos.social

                                @wdormann TL;DR: lame AI excuse award for laziness and incompetence

                                wdormann@infosec.exchangeW This user is from outside of this forum
                                wdormann@infosec.exchangeW This user is from outside of this forum
                                wdormann@infosec.exchange
                                wrote last edited by
                                #102

                                @ReneRebe
                                Yeah.

                                I mean, fine, you can say that Qualys is doing it this way too. But TBH, I got the impression that the Qualys example was found after the fact when everything blew up, as opposed to purposefully modeling your workflow after Qualys.

                                But the real red flag is this:

                                Patch first. Update your distribution's kernel package to one that includes mainline commit a664bf3d603d — it reverts the 2017 algif_aead in-place optimization, so page-cache pages can no longer end up in the writable destination scatterlist. Most major distributions are shipping the fix now.

                                No human being on the planet would have concluded such a thing. Anyone with half a wit would know for a fact that no distribution had updates at the time that copy.fail was published. Not even one of the FOUR DEMO DISTROS IN THE PAGE ITSELF. 🤦‍♂️

                                This all was AI-driven YOLO attention seeking, and the linked thread from Brian is just damage control.

                                Link Preview Image
                                1 Reply Last reply
                                0
                                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                  The CEO of Theori / Xint has a damage-control thread explaining why they chose to release the vulnerability details in a way that left all of the Linux distros in the dark.

                                  TL;DR: With AI in the mix, the old way of coordinating vulnerabilities doesn't scale anymore.

                                  aristot73@infosec.exchangeA This user is from outside of this forum
                                  aristot73@infosec.exchangeA This user is from outside of this forum
                                  aristot73@infosec.exchange
                                  wrote last edited by
                                  #103

                                  @wdormann Hi Will. Shouldn't/couldn't the Linux security team have imposed an embargo and coordinated with the distro's?

                                  wdormann@infosec.exchangeW 1 Reply Last reply
                                  0
                                  • aristot73@infosec.exchangeA aristot73@infosec.exchange

                                    @wdormann Hi Will. Shouldn't/couldn't the Linux security team have imposed an embargo and coordinated with the distro's?

                                    wdormann@infosec.exchangeW This user is from outside of this forum
                                    wdormann@infosec.exchangeW This user is from outside of this forum
                                    wdormann@infosec.exchange
                                    wrote last edited by
                                    #104

                                    @aristot73
                                    In an ideal world, yes.
                                    But they're not interested in doing such things.
                                    For reasons, presumably.

                                    Link Preview Image
                                    aristot73@infosec.exchangeA 1 Reply Last reply
                                    0
                                    • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                      @aristot73
                                      In an ideal world, yes.
                                      But they're not interested in doing such things.
                                      For reasons, presumably.

                                      Link Preview Image
                                      aristot73@infosec.exchangeA This user is from outside of this forum
                                      aristot73@infosec.exchangeA This user is from outside of this forum
                                      aristot73@infosec.exchange
                                      wrote last edited by
                                      #105

                                      @wdormann wow.... 🤦‍♂️

                                      1 Reply Last reply
                                      0
                                      • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                        While this vulnerability seems to be discovered using AI ("Xint Code"), I have to assume that they also let the AI decide how to do the vulnerability coordination as well.

                                        • major builds are out as of this writing 😂

                                          No distros have official updates for CVE-2026-31431. Fedora 42 and newer have updates, but no official advisory or acknowledgement of CVE-2026-31431. So with them it's unclear if it's even intentional. Red Hat, Ubuntu, Amazon Linux, and Suse all have advisories as of now, but NO updates.

                                        • disable the algif_aead module as a mitigation. 😂

                                          Bespoke distros like RHEL don't use a module, it's compiled into the kernel.

                                        I can't figure out what the Xint Code angle is with this copyfail stuff. On one hand, yes, it is a true vulnerability that affects a LOT of Linux distros available. And they did submit the bug for fixing to the upstream kernel people.

                                        BUT the CVE has only existed for a week. And NONE of the distros IN THEIR ADVISORY had updates available at the time that they pulled the trigger for publication of the shiny copy.fail website.

                                        I struggle to think of how this even happens. In all my years of infosec, you're either on board with doing CVD (e.g. coordinating with the former CERT/CC) or you're not (dropping 0day). But this all fits bizarrely in the middle. The publication gives the guise that they did the right thing, (and please use our AI services). But at the same time, they clearly chose to release the vulnerability details and functional exploit before any distro had the ability to properly do anything about it.

                                        Either these Xint Code (Theori) people have a hidden agenda or ulterior motive that we aren't aware of yet. Or they're just really bad at coordinated vulnerability disclosure. You pick.

                                        missaemilia@mastodon.gamedev.placeM This user is from outside of this forum
                                        missaemilia@mastodon.gamedev.placeM This user is from outside of this forum
                                        missaemilia@mastodon.gamedev.place
                                        wrote last edited by
                                        #106

                                        @wdormann What really shit me off about the thing is the PoC test code they published.
                                        They suggest you run it by curl'ing a URL from their site, directly into python and su.
                                        On a vulnerability that's a fastpath to root.
                                        But it gets better because you look at the code and it's obfuscated? No comments, no detail, compacted as much as possible for python.

                                        Okay, it's fairly basic obfuscation, I could work it out in a few minutes.

                                        It runs an x86_64 ELF binary, that it ships as hex-encoded zlib.

                                        missaemilia@mastodon.gamedev.placeM 1 Reply Last reply
                                        0
                                        • missaemilia@mastodon.gamedev.placeM missaemilia@mastodon.gamedev.place

                                          @wdormann What really shit me off about the thing is the PoC test code they published.
                                          They suggest you run it by curl'ing a URL from their site, directly into python and su.
                                          On a vulnerability that's a fastpath to root.
                                          But it gets better because you look at the code and it's obfuscated? No comments, no detail, compacted as much as possible for python.

                                          Okay, it's fairly basic obfuscation, I could work it out in a few minutes.

                                          It runs an x86_64 ELF binary, that it ships as hex-encoded zlib.

                                          missaemilia@mastodon.gamedev.placeM This user is from outside of this forum
                                          missaemilia@mastodon.gamedev.placeM This user is from outside of this forum
                                          missaemilia@mastodon.gamedev.place
                                          wrote last edited by
                                          #107

                                          @wdormann Just incase I need to say this for anyone, and I'm really hoping I don't.

                                          I've never seen a worse PoC code. You are supposed to ship extremely readable, well documented code that demonstrates procedure of the exploit.

                                          You do not suggest people fucking blindly run it from a URL directly onto a machine, without any visibility into what's even running???

                                          I've never heard of a quicker way of getting your machines shoved into a botnet.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups