this post was submitted on 02 May 2026
96 points (98.0% liked)

Linux

13571 readers
374 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Skyline969@piefed.ca 23 points 1 week ago (2 children)

Ubuntu is one of the most used distros in both desktop and server environments. Take down the update servers, can’t patch CopyFail. Can’t patch CopyFail, more time to access affected systems.

That’s my paranoid take anyway.

[–] kamstrup@programming.dev 11 points 1 week ago (3 children)

Normally patches roll out before the vulnerability is disclosed. But I honestly don't know the status on CopyFail

[–] Jesus_666@lemmy.world 7 points 1 week ago (3 children)

Most distros delivered patched kernels well before the vulnerability was publicly disclosed. Not sure if Ubuntu did but they had ample time to do so.

[–] lengau@midwest.social 5 points 1 week ago (1 children)

Not true. None of the major distros were alerted and Ubuntu, Debian, RHEL, etc. were all struggling at the last minute. See: https://infosec.exchange/@wdormann/116489443704631952

However, none of those DDoS's took out the archive servers, so Ubuntu users could still get new kernels.

[–] Jesus_666@lemmy.world 3 points 1 week ago (1 children)

Interesting. So only the fast distros were done patching by time of disclosure. The ones you wouldn't run a server on. Because only the kernel devs better informed. That's... pretty amateurish from the guys who discovered CopyFail.

[–] lengau@midwest.social 5 points 1 week ago

Even then, some of the upstream LTS kernels didn't get the patch until the 30th.

[–] Successful_Try543@feddit.org 4 points 1 week ago* (last edited 1 week ago)

Ubuntu 26.04 has already been patched, but not the older (LTS) releases.

https://ubuntu.com/security/CVE-2026-31431

@Jesus_666 @kamstrup its my understanding that this actually hasn’t been patched in most distributions. The ubuntu statement says they released mitigations and disabled the kernel module affected but that patches will be released. according to a post on linkedin made yesterday and a video attached to it demonstrating the exploit on a current kali release it hasnt been fixed

[–] lengau@midwest.social 3 points 1 week ago

The people who found the vulnerability didn't do proper coordinated disclosure. See: https://infosec.exchange/@wdormann/116489443704631952

[–] Miaou@jlai.lu 2 points 1 week ago

The Debian Bookworm fix was only rolled out last night. Bookworm was not directly affected though, so maybe that's why it took a bit more time

[–] poinck@lemmy.world 3 points 1 week ago (1 children)

I could update Ubuntu servers despite the DDoS.

[–] Successful_Try543@feddit.org 1 points 1 week ago (1 children)

Does Ubuntu, like Debian, make you choose a repository mirror during the installation?

[–] lengau@midwest.social 2 points 1 week ago

Typically they use archive.ubuntu.com, which was not affected.