Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • About Bonfire
Jan Wildeboer 😷:krulorange:
@jwildeboer@social.wildeboer.net  ·  activity timestamp 3 days ago

Ah, the #copyfail clickbait posts are coming. Here’s my serious contribution. On your Linux machine add

initcall_blacklist=algif_aead_init

to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

# grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

This mitigation comes courtesy of Red Hat. Our engineers keep you safe :)

1/4

Copyfail on Linux? Stay calm and read this.
Copyfail on Linux? Stay calm and read this.
Copyfail on Linux? Stay calm and read this.
  • Copy link
  • Flag this post
  • Block
Jan Wildeboer 😷:krulorange:
@jwildeboer@social.wildeboer.net replied  ·  activity timestamp 3 days ago

Some more details from our CVE page on CVE-2026-31431 at https://access.redhat.com/security/cve/cve-2026-31431 For more infos also on availability of updates see https://nvd.nist.gov/vuln/detail/CVE-2026-31431and https://www.cve.org/CVERecord?id=CVE-2026-31431

2/4

https://www.cve.org/CVERecord?id=CVE-2026-31431

cve-details

General guidance which is applicable to many products is below. Warning: there may be performance impacts for modifying functionality that uses kernel cryptographic functions. Though the affected module cannot be blacklisted, the affected functions themselves can be using the following boot arguments:

initcall_blacklist=algif_aead_init

Alternatively, the af_alg interface itself can be blocked:

initcall_blacklist=af_alg_init

As a further alternative, the affected algorithm can be blocked:

initcall_blacklist=crypto_authenc_esn_module_init
General guidance which is applicable to many products is below. Warning: there may be performance impacts for modifying functionality that uses kernel cryptographic functions. Though the affected module cannot be blacklisted, the affected functions themselves can be using the following boot arguments: initcall_blacklist=algif_aead_init Alternatively, the af_alg interface itself can be blocked: initcall_blacklist=af_alg_init As a further alternative, the affected algorithm can be blocked: initcall_blacklist=crypto_authenc_esn_module_init
General guidance which is applicable to many products is below. Warning: there may be performance impacts for modifying functionality that uses kernel cryptographic functions. Though the affected module cannot be blacklisted, the affected functions themselves can be using the following boot arguments: initcall_blacklist=algif_aead_init Alternatively, the af_alg interface itself can be blocked: initcall_blacklist=af_alg_init As a further alternative, the affected algorithm can be blocked: initcall_blacklist=crypto_authenc_esn_module_init
  • Copy link
  • Flag this comment
  • Block
Jan Wildeboer 😷:krulorange:
@jwildeboer@social.wildeboer.net replied  ·  activity timestamp 3 days ago

Here is @Larvitz gist that gives you an Ansible playbook to deploy the mitigation on (big) fleets: https://burningboard.net/@Larvitz/116498775760655365

3/4

  • Copy link
  • Flag this comment
  • Block
Jan Wildeboer 😷:krulorange:
@jwildeboer@social.wildeboer.net replied  ·  activity timestamp 3 days ago

The TL;DR of #CopyFail in my opinion: Due to an unusual (I personally think irresponsible) disclosure, we sysadmins are now dealing with having to push out an immediate mitigation until the updated kernel packages become available. I am trying to help in a pragmatic way. This too will pass, but it also shows that running Linux servers comes with responsibilities to protect your machines and users.

4/4

  • Copy link
  • Flag this comment
  • Block
Jan Wildeboer 😷:krulorange:
@jwildeboer@social.wildeboer.net replied  ·  activity timestamp 3 days ago

ADDENDUM: Now also a blog post at https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/

Jan Wildeboer's Blog

PSA on Copy Fail (CVE-2026-31431)

This is a short PSA (Public Service Announcement) on how I dealt with the Copy Fail vulnerability. This will be updated as soon as the updated kernel packages are made available. This is a pragmatic post on how to deploy a mitigiation RIGHT NOW.
⁂
More from
Jan Wildeboer 😷:krulorange:
  • Copy link
  • Flag this comment
  • Block
Log in

Bonfire social

Bonfire social: About · Code of conduct · Privacy ·
Bonfire social · 1.0.0-rc.3.6 no JS en
Automatic federation enabled
  • Explore
  • About
  • Code of Conduct
Home
Login