Path: csiph.com!weretis.net!feeder9.news.weretis.net!panix!.POSTED.2602:f977:0:1::1!not-for-mail From: pa@see.signature.invalid (Pierre Asselin) Newsgroups: comp.os.linux.misc Subject: Re: copy.fail Date: Sat, 2 May 2026 21:46:24 -0000 (UTC) Organization: PANIX Public Access Internet and UNIX, NYC Message-ID: <10t5rbg$ket$1@reader1.panix.com> References: <10t09ci$3mbqc$1@news.xmission.com> <10t228c$17p94$1@news1.tnib.de> <10t4jl1$3ume2$1@news.xmission.com> Injection-Date: Sat, 2 May 2026 21:46:24 -0000 (UTC) Injection-Info: reader1.panix.com; posting-host="2602:f977:0:1::1"; logging-data="20957"; mail-complaints-to="abuse@panix.com" User-Agent: tin/2.6.4-20241224 ("Helmsdale") (NetBSD/10.1 (amd64)) Xref: csiph.com comp.os.linux.misc:86098 Kenny McCormack wrote: > By the way, what is the patch status of this problem? My reading of some > of the posts upthread is that it is always patched (fixed) in some > kernels/distros. Is that correct? Depends on the distro. If you compile your own kernels, just get a recent one from kernel.org . For what it's worth, on Gentoo I just switched to 6.18.26 and the vulnerability is patched. (6.18.18 was vulnerable.) -- pa at panix dot com