<p>We dig into the Copy Fail vulnerability and test a proof-of-concept against our own box. Plus, Jon Seager, VP of Engineering at Canonical joins us, and we kick off the BSD Challenge!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://jupitersignal.memberful.com/checkout?plan=117630r">Jupiter Party Annual Membership</a>: <a rel="nofollow" href="https://jupitersignal.memberful.com/checkout?plan=117630r">Put your support on automatic with our annual plan, and get one month of membership for free!</a></li><li><a rel="nofollow" href="https://defined.net/unplugged">Managed Nebula</a>: <a rel="nofollow" href="https://defined.net/unplugged">Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love.</a></li></ul><p><a rel="payment" href="https://jupitersignal.memberful.com/checkout?plan=52946">Support LINUX Unplugged</a></p><p>Links:</p><ul><li><a title="πŸ’₯ Gets Sats Quick and Easy with Strike" href="https://strike.me/" rel="nofollow">πŸ’₯ Gets Sats Quick and Easy with Strike</a></li><li><a title="πŸ“» LINUX Unplugged on Fountain.FM" href="https://www.fountain.fm/show/dWiuBeqpDSM86AwXRXov" rel="nofollow">πŸ“» LINUX Unplugged on Fountain.FM</a></li><li><a title="Copy Fail β€” CVE-2026-31431" href="https://copy.fail/#exploit" rel="nofollow">Copy Fail β€” CVE-2026-31431</a> β€” "An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root." β€” Theori</li><li><a title="Copy Fail: 732 Bytes to Root - Xint" href="https://xint.io/blog/copy-fail-linux-distributions" rel="nofollow">Copy Fail: 732 Bytes to Root - Xint</a> β€” "A single 732-byte Python script can edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017." β€” Xint</li><li><a title="Linux Kernel Bug Explained - Jorijn" href="https://jorijn.com/en/blog/copy-fail-cve-2026-31431-linux-kernel-bug-explained/" rel="nofollow">Linux Kernel Bug Explained - Jorijn</a> β€” "CopyFail is more portable. One script, every distro, no offsets. Dirty Pipe needed kernel β‰₯ 5.8; Copy Fail covers 2017–2026." β€” Jorijn"Kubernetes Pod Security Standards (Restricted) and default seccomp do NOT block the syscall used." β€” Jorijn</li><li><a title="Ars: Most Severe Linux Threat in Years" href="https://arstechnica.com/security/2026/04/as-the-most-severe-linux-threat-in-years-surfaces-the-world-scrambles/" rel="nofollow">Ars: Most Severe Linux Threat in Years</a> β€” "The most severe Linux threat to surface in years catches the world flat-footed." β€” Ars Technica</li><li><a title="Sysdig: CVE-2026-31431 Analysis" href="https://www.sysdig.com/blog/cve-2026-31431-copy-fail-linux-kernel-flaw-lets-local-users-gain-root-in-seconds/" rel="nofollow">Sysdig: CVE-2026-31431 Analysis</a> β€” "The flaw was introduced in 2017 via commit 72548b093ee3, which switched AEAD operations to in-place processing." β€” Sysdig</li><li><a title="CERT-EU Advisory" href="https://cert.europa.eu/publications/security-advisories/2026-005/" rel="nofollow">CERT-EU Advisory</a></li><li><a title="Ubuntu Security Tracker" href="https://ubuntu.com/security/CVE-2026-31431" rel="nofollow">Ubuntu Security Tracker</a></li><li><a title="The Register: Crypto Flaw" href="https://www.theregister.com/2026/04/30/linux_cryptographic_code_flaw/" rel="nofollow">The Register: Crypto Flaw</a></li><li><a title="Kernel Patch (reverts 2017 optimization)" href="https://github.com/torvalds/linux/commit/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5.diff" rel="nofollow">Kernel Patch (reverts 2017 optimization)</a> β€” "This mostly reverts commit 72548b093ee3 except for the copying of the associated data." β€” Kernel Commit</li><li><a title="Buggy Commit: 72548b093ee3 (2017)" href="https://github.com/torvalds/linux/commit/72548b093ee3" rel="nofollow">Buggy Commit: 72548b093ee3 (2017)</a></li><li><a title="DeepWiki: AF_ALG Internals" href="https://deepwiki.com/theori-io/copy-fail-CVE-2026-31431/3.1-linux-crypto-api-(af_alg)-internals" rel="nofollow">DeepWiki: AF_ALG Internals</a></li><li><a title="oss-security Disclosure" href="https://www.openwall.com/lists/oss-security/2026/04/29/23" rel="nofollow">oss-security Disclosure</a></li><li><a title="PSA + GRUB Mitigation - Jan Wildeboer" href="https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/" rel="nofollow">PSA + GRUB Mitigation - Jan Wildeboer</a></li><li><a title="Ubuntu 26.04 LTS (Resolute Raccoon) Released" href="https://canonical.com/blog/canonical-releases-ubuntu-26-04-lts-resolute-raccoon" rel="nofollow">Ubuntu 26.04 LTS (Resolute Raccoon) Released</a> β€” "Ubuntu 26.04 LTS sets the example for providing best-in-class resilience while simultaneously embracing innovation and the advancement of open source." β€” Jon Seager, VP Ubuntu Engineering</li><li><a title="The Future of AI in Ubuntu - Jon Seager" href="https://discourse.ubuntu.com/t/the-future-of-ai-in-ubuntu/81130" rel="nofollow">The Future of AI in Ubuntu - Jon Seager</a> β€” "Throughout 2026 we'll be working on enabling access to frontier AI for Ubuntu users in a way that is deliberate, secure, and aligned with our open source values." β€” Jon Seager</li><li><a title="Ubuntu 26.04 Release Notes" href="https://documentation.ubuntu.com/release-notes/26.04/" rel="nofollow">Ubuntu 26.04 Release Notes</a></li><li><a title="Ubuntu AI Features Throughout 2026 - Phoronix" href="https://www.phoronix.com/news/Ubuntu-AI-Features-2026" rel="nofollow">Ubuntu AI Features Throughout 2026 - Phoronix</a> β€” "Canonical's approach to AI is refreshingly thoughtful β€” Microsoft should take note." β€” ZDNet</li><li><a title="Canonical DDoS Attack Update" href="https://discourse.ubuntu.com/t/update-concerning-ddos-attack-on-canonical-and-ubuntu/81482" rel="nofollow">Canonical DDoS Attack Update</a> β€” "Canonical's web infrastructure is under a sustained, cross-border attack and we are working to address it." β€” arcticp, Canonical</li><li><a title="Ubuntu Weekly Newsletter #942" href="https://discourse.ubuntu.com/t/ubuntu-weekly-newsletter-issue-942/81204" rel="nofollow">Ubuntu Weekly Newsletter #942</a></li><li><a title="Canonical AI Approach - ZDNet" href="https://www.zdnet.com/article/canonical-ai-approach-thoughtful-microsoft-should-take-note/" rel="nofollow">Canonical AI Approach - ZDNet</a></li><li><a title="9to5Linux: Opt-In LLM Tools" href="https://9to5linux.com/canonical-plans-to-integrate-opt-in-llm-based-tools-in-future-ubuntu-releases/" rel="nofollow">9to5Linux: Opt-In LLM Tools</a></li><li><a title="uutils/coreutils: Cross-platform Rust rewrite of the GNU coreutils" href="https://github.com/uutils/coreutils" rel="nofollow">uutils/coreutils: Cross-platform Rust rewrite of the GNU coreutils</a></li><li><a title="LINUX Unplugged 636: Engineering the Future" href="https://linuxunplugged.com/636" rel="nofollow">LINUX Unplugged 636: Engineering the Future</a></li><li><a title="LiveCD fails to start X session on QEMU Β· Issue #354 Β· ghostbsd/issues" href="https://github.com/ghostbsd/issues/issues/354" rel="nofollow">LiveCD fails to start X session on QEMU Β· Issue #354 Β· ghostbsd/issues</a></li><li><a title="Monty&apos;s β€œrescue” drive NixOS config" href="https://github.com/pmontgo33/nix-config" rel="nofollow">Monty's β€œrescue” drive NixOS config</a></li><li><a title="Magnolia Mayhem&apos;s BSD Challenge Report" href="https://www.ministryofmayhem.space/posts/bsdptdeux/" rel="nofollow">Magnolia Mayhem's BSD Challenge Report</a></li><li><a title="Pick: NASty" href="https://github.com/nasty-project/nasty" rel="nofollow">Pick: NASty</a> β€” NASty is a NAS operating system built on NixOS and bcachefs. It turns commodity hardware into a storage appliance serving NFS, SMB, iSCSI, and NVMe-oF β€” managed from a single web UI, updated atomically, and rolled back when things go sideways.</li><li><a title="Pick: Defuse" href="https://github.com/shonebinu/Defuse" rel="nofollow">Pick: Defuse</a> β€” Defuse is a GTK4 application for removing image backgrounds locally.</li><li><a title="Defuse on Flathub" href="https://flathub.org/en/apps/io.github.shonebinu.Defuse" rel="nofollow">Defuse on Flathub</a></li></ul>

LINUX Unplugged

Jupiter Broadcasting

665: Patch Me If You Can

MAY 3, 202680 MIN
LINUX Unplugged

665: Patch Me If You Can

MAY 3, 202680 MIN

Description

We dig into the Copy Fail vulnerability and test a proof-of-concept against our own box. Plus, Jon Seager, VP of Engineering at Canonical joins us, and we kick off the BSD Challenge!Sponsored By:Jupiter Party Annual Membership: Put your support on automatic with our annual plan, and get one month of membership for free!Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love.Support LINUX UnpluggedLinks:πŸ’₯ Gets Sats Quick and Easy with StrikeπŸ“» LINUX Unplugged on Fountain.FMCopy Fail β€” CVE-2026-31431 β€” "An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root." β€” TheoriCopy Fail: 732 Bytes to Root - Xint β€” "A single 732-byte Python script can edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017." β€” XintLinux Kernel Bug Explained - Jorijn β€” "CopyFail is more portable. One script, every distro, no offsets. Dirty Pipe needed kernel β‰₯ 5.8; Copy Fail covers 2017–2026." β€” Jorijn"Kubernetes Pod Security Standards (Restricted) and default seccomp do NOT block the syscall used." β€” JorijnArs: Most Severe Linux Threat in Years β€” "The most severe Linux threat to surface in years catches the world flat-footed." β€” Ars TechnicaSysdig: CVE-2026-31431 Analysis β€” "The flaw was introduced in 2017 via commit 72548b093ee3, which switched AEAD operations to in-place processing." β€” SysdigCERT-EU AdvisoryUbuntu Security TrackerThe Register: Crypto FlawKernel Patch (reverts 2017 optimization) β€” "This mostly reverts commit 72548b093ee3 except for the copying of the associated data." β€” Kernel CommitBuggy Commit: 72548b093ee3 (2017)DeepWiki: AF_ALG Internalsoss-security DisclosurePSA + GRUB Mitigation - Jan WildeboerUbuntu 26.04 LTS (Resolute Raccoon) Released β€” "Ubuntu 26.04 LTS sets the example for providing best-in-class resilience while simultaneously embracing innovation and the advancement of open source." β€” Jon Seager, VP Ubuntu EngineeringThe Future of AI in Ubuntu - Jon Seager β€” "Throughout 2026 we'll be working on enabling access to frontier AI for Ubuntu users in a way that is deliberate, secure, and aligned with our open source values." β€” Jon SeagerUbuntu 26.04 Release NotesUbuntu AI Features Throughout 2026 - Phoronix β€” "Canonical's approach to AI is refreshingly thoughtful β€” Microsoft should take note." β€” ZDNetCanonical DDoS Attack Update β€” "Canonical's web infrastructure is under a sustained, cross-border attack and we are working to address it." β€” arcticp, CanonicalUbuntu Weekly Newsletter #942Canonical AI Approach - ZDNet9to5Linux: Opt-In LLM Toolsuutils/coreutils: Cross-platform Rust rewrite of the GNU coreutilsLINUX Unplugged 636: Engineering the FutureLiveCD fails to start X session on QEMU Β· Issue #354 Β· ghostbsd/issuesMonty's β€œrescue” drive NixOS configMagnolia Mayhem's BSD Challenge ReportPick: NASty β€” NASty is a NAS operating system built on NixOS and bcachefs. It turns commodity hardware into a storage appliance serving NFS, SMB, iSCSI, and NVMe-oF β€” managed from a single web UI, updated atomically, and rolled back when things go sideways.Pick: Defuse β€” Defuse is a GTK4 application for removing image backgrounds locally.Defuse on Flathub