Le 30/04/2026 à 11:56, Ludovic Courtès a écrit :
Hi!
(Cc: kernel team.)
Gary Johnson <[email protected]> skribis:
My apologies if I've missed announcements related to this, but have we updated
our Linux kernel yet to patch against the recent Copy Fail exploit?
https://copy.fail/
I was looking at it just now. There are more details in their post:
https://xint.io/blog/copy-fail-linux-distributions
But I only found the list of Linux versions that include a fix in this
post:
https://seclists.org/oss-sec/2026/q2/281
From what I can see 6.19.12 and 6.18.22, which we currently ship,
include the fix.
Other versions are likely vulnerable:
--8<---------------cut here---------------start------------->8---
$ guix package -A linux-libre$
linux-libre 6.6.134 out gnu/packages/linux.scm:1014:2
linux-libre 6.19.12 out gnu/packages/linux.scm:1014:2
linux-libre 6.18.22 out gnu/packages/linux.scm:1014:2
linux-libre 6.12.81 out gnu/packages/linux.scm:1014:2
linux-libre 6.1.168 out gnu/packages/linux.scm:1014:2
linux-libre 5.15.202 out gnu/packages/linux.scm:1014:2
linux-libre 5.10.252 out gnu/packages/linux.scm:1014:2
$ guix describe |grep -A2 guix
guix ecda809
repository URL: https://git.guix.gnu.org/guix.git
branch: master
commit: ecda809fd454fa1574616ecfcd695678238e3aca
--8<---------------cut here---------------end--------------->8---
Looks like we’re providing the offending facility as a module:
--8<---------------cut here---------------start------------->8---
$ zgrep CONFIG_CRYPTO_USER_API_AEAD /proc/config.gz
CONFIG_CRYPTO_USER_API_AEAD=m
$ uname -sr
Linux 6.18.22-gnu
--8<---------------cut here---------------end--------------->8---
Thus one should be able to “rmmod algif_aead” and be done with it.
Thoughts?
Ludo’.
I would like to alert system administrators that
the mitigation announced on the copy.fail site is
not sufficient: Simply rmmod or checking with
lsmod is not enough to confirm the absence of the
problematic module, as it could be builtin into
the kernel.
To verify its presence in memory, please run:
# grep algif_aead /lib/modules/$(uname
-r)/modules.builtin
If the output includes
kernel/crypto/algif_aead.ko, the module is
present, and a system reboot is required to remove
it from memory after adding a modprobe file.
Best regards,
Medernach Emmanuel