• 'Copy fail' bug

    From Axel@none@not.here to alt.os.linux.mint,alt.os.linux.ubuntu on Sat May 2 12:24:16 2026
    From Newsgroup: alt.os.linux.ubuntu


    https://www.itnews.com.au/news/copy-fail-linux-privesc-bug-lay-dormant-in-kernel-since-2017-625492

    https://cert.europa.eu/publications/security-advisories/2026-005/

    https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available


    does this mean Linux has a virus and our computers are compromised and
    our data is at risk? (my knowledge of Linux/LM is very basic)
    --
    Linux Mint 22.3

    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From rbowman@bowman@montana.com to alt.os.linux.mint,alt.os.linux.ubuntu on Sat May 2 03:39:12 2026
    From Newsgroup: alt.os.linux.ubuntu

    On Sat, 2 May 2026 12:24:16 +1000, Axel wrote:

    https://www.itnews.com.au/news/copy-fail-linux-privesc-bug-lay-dormant-
    in-kernel-since-2017-625492

    https://cert.europa.eu/publications/security-advisories/2026-005/

    https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available


    does this mean Linux has a virus and our computers are compromised and
    our data is at risk? (my knowledge of Linux/LM is very basic)

    If you have updated your system the problem is already fixed for most
    distros. Even if you have not in most cases for home users the exploit requires physical presence.
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Axel@none@not.here to alt.os.linux.mint,alt.os.linux.ubuntu on Sat May 2 14:12:55 2026
    From Newsgroup: alt.os.linux.ubuntu

    rbowman wrote:
    On Sat, 2 May 2026 12:24:16 +1000, Axel wrote:

    https://www.itnews.com.au/news/copy-fail-linux-privesc-bug-lay-dormant-
    in-kernel-since-2017-625492
    https://cert.europa.eu/publications/security-advisories/2026-005/

    https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available


    does this mean Linux has a virus and our computers are compromised and
    our data is at risk? (my knowledge of Linux/LM is very basic)
    If you have updated your system the problem is already fixed for most distros. Even if you have not in most cases for home users the exploit requires physical presence.

    I do all the updates the update manager shows. I'm using Linux Mint 22.3
    (home user only), so it seems I am ok then.
    --
    Linux Mint 22.3

    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Lawrence =?iso-8859-13?q?D=FFOliveiro?=@ldo@nz.invalid to alt.os.linux.mint,alt.os.linux.ubuntu on Sat May 2 04:21:49 2026
    From Newsgroup: alt.os.linux.ubuntu

    On Sat, 2 May 2026 12:24:16 +1000, Axel wrote:

    does this mean Linux has a virus and our computers are compromised
    and our data is at risk? (my knowledge of Linux/LM is very basic)

    The vulnerability just means that anybody who has nonprivileged user
    access to execute arbitrary (nonprivileged) commands on your machine
    can promote themselves to privileged access.

    Do you have multiple users on your machine? Typically, the answer
    would be “no” -- I imagine it’s just you.

    Even public-facing servers would normally run very restricted apps
    when offering services to all and sundry.
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Axel@none@not.here to alt.os.linux.mint,alt.os.linux.ubuntu on Sat May 2 14:26:42 2026
    From Newsgroup: alt.os.linux.ubuntu

    Lawrence D’Oliveiro wrote:
    On Sat, 2 May 2026 12:24:16 +1000, Axel wrote:

    does this mean Linux has a virus and our computers are compromised
    and our data is at risk? (my knowledge of Linux/LM is very basic)
    The vulnerability just means that anybody who has nonprivileged user
    access to execute arbitrary (nonprivileged) commands on your machine
    can promote themselves to privileged access.

    Do you have multiple users on your machine? Typically, the answer
    would be “no” -- I imagine it’s just you.

    yes, just myself


    Even public-facing servers would normally run very restricted apps
    when offering services to all and sundry.
    --
    Linux Mint 22.3

    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Alan K.@alan@invalid.com to alt.os.linux.mint,alt.os.linux.ubuntu on Sat May 2 08:16:12 2026
    From Newsgroup: alt.os.linux.ubuntu

    On 5/1/26 10:24 PM, Axel wrote:

    https://www.itnews.com.au/news/copy-fail-linux-privesc-bug-lay-dormant-in-kernel-since-2017-625492

    https://cert.europa.eu/publications/security-advisories/2026-005/

    https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available


    does this mean Linux has a virus and our computers are compromised and
    our data is at risk? (my knowledge of Linux/LM is very basic)

    Seems to me the takeaway from the last article is to run this command:

    grep -qE '^algif_aead ' /proc/modules && echo "Affected module is loaded" || echo
    "Affected module is NOT loaded"

    A one liner. In my 22.3 it shows NOT loaded.
    --
    Mint 22.3, Thunderbird 140.10.0esr, Firefox 150.0.1
    Alan K.
    --- Synchronet 3.22a-Linux NewsLink 1.2