Tootfinder

Opt-in global Mastodon full text search. Join the index!

@mgorny@social.treehouse.systems
2026-05-19 15:43:09

We've also posted about our #CopyFail, #DirtyFrag, #Fragnesia handling on the #Gentoo website:
gentoo.org/news/2026/05/19/cop
…and yes, another secfix round coming.
CC @…

@selea@social.linux.pizza
2026-04-29 20:13:04

The #copyfail exploit is not fun...

@gideonstar@mastodon.gideonstar.de
2026-05-08 07:21:58

If this continues, I'll uninstall sudo.
#copyfail #dirtyfrag

@tezoatlipoca@mas.to
2026-05-01 15:41:26

Just polled my software team: without googling or asking, have you heard of #copyfail ? if so, do you know what it is sufficiently to explain it to a colleague?
Not a single hand. We make embedded #linux devices. ( yes, ours are affected.)
Call me old fashioned, but when I was a

@hex@kolektiva.social
2026-05-02 07:23:18

"It places page cache pages in a writable scatterlist, separated from the legitimate write region by nothing more than an offset boundary. The design assumes every AEAD algorithm will confine its writes to the intended destination, but nothing in the API enforces this, and nothing documents it as a requirement.
Unfortunately, one AEAD algorithm breaks this silent invariant."
"No other standard AEAD algorithm in the kernel [uses memory that doesn't belong to it as a scratch pad]. GCM, CCM, and regular authenc all confine their writes to the legitimate output area. authencesn alone writes past the boundary."
I'm actually amazed that there's only one bug here. Somehow almost everyone just managed to do the right thing, despite no mechanism enforcing it and no documentation describing it. That's just amazing. It's a testament to the skill of those developers, despite an incredibly bad design.
#copyfail

@Lach@social.linux.pizza
2026-05-05 10:41:50

Copy.fail is faster than sudo su -, so I'm switching to that method now...
Just so easy and convenient... #copyfail

@darkrat@chaosfurs.social
2026-04-29 19:26:45

Holy. Fucking. Fuckballs.
This exploit is... insane.
> An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root
copy.fail/

@mgorny@social.treehouse.systems
2026-04-30 05:38:38

So you read about #CopyFail, and are like… owww, shit. But then you see that it was responsibly disclosed after being fixed in main, we had releases since, they went stable in #Gentoo (over other #security fixes), so we should be good, right?
Except that it turns out that after it has been fixed in mainline, nobody bothered actually backporting the fix to all the LTS branches. And it doesn't apply cleanly (#Gentoo #Linux

@mgorny@social.treehouse.systems
2026-05-02 05:55:56

Greg Kroah-Hartman: "If you look there are thousands of unfixed CVEs in the older LTS kernels right now, and if distros or users that rely on those older branches wish to see those resolved, they need to provide working backports to us to apply, as our first attempt did not work (which is why they are unfixed in those branches.)"
Really asking for a "Pray tell us", given that nobody actually bothered disclosing the problem to downstreams and that the commit message was hiding it.
Either way, apparently the great LLM-backed patch backporting process that #NVidia is so proud of doesn't really work. Upstream doesn't really care about #LTS branches, and they should be considered insecure by default.
#Gentoo #Linux #CopyFail #security