On 2026-04-30 11:56, Ludovic Courtès wrote:
Hi!

(Cc: kernel team.)

Gary Johnson <[email protected]> skribis:

My apologies if I've missed announcements related to this, but have we updated our Linux kernel yet to patch against the recent Copy Fail exploit?

https://copy.fail/

I was looking at it just now.  There are more details in their post:

  https://xint.io/blog/copy-fail-linux-distributions

But I only found the list of Linux versions that include a fix in this
post:

  https://seclists.org/oss-sec/2026/q2/281

From what I can see 6.19.12 and 6.18.22, which we currently ship,
include the fix.

Other versions are likely vulnerable:

--8<---------------cut here---------------start------------->8---
$ guix package -A linux-libre$
linux-libre     6.6.134         out     gnu/packages/linux.scm:1014:2
linux-libre     6.19.12         out     gnu/packages/linux.scm:1014:2
linux-libre     6.18.22         out     gnu/packages/linux.scm:1014:2
linux-libre     6.12.81         out     gnu/packages/linux.scm:1014:2
linux-libre     6.1.168         out     gnu/packages/linux.scm:1014:2
linux-libre     5.15.202        out     gnu/packages/linux.scm:1014:2
linux-libre     5.10.252        out     gnu/packages/linux.scm:1014:2
$ guix describe |grep -A2 guix
  guix ecda809
    repository URL: https://git.guix.gnu.org/guix.git
    branch: master
    commit: ecda809fd454fa1574616ecfcd695678238e3aca
--8<---------------cut here---------------end--------------->8---

Looks like we’re providing the offending facility as a module:

--8<---------------cut here---------------start------------->8---
$ zgrep CONFIG_CRYPTO_USER_API_AEAD /proc/config.gz
CONFIG_CRYPTO_USER_API_AEAD=m
$ uname -sr
Linux 6.18.22-gnu
--8<---------------cut here---------------end--------------->8---

Thus one should be able to “rmmod algif_aead” and be done with it.

Thoughts?

Ludo’.

Hi!

I found out that the following latest versions contain backported fix:
5.10.254
5.15.204
6.1.170
6.6.137
6.12.85

Reply via email to