home.social

#canonical — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #canonical, aggregated by home.social.

  1. This is very good. Cloudflare should be fired.

    "The four-hour gap between the onset of the attack and the appearance of Cloudflare addresses on Canonical’s repository hostnames is the interval during which the purchasing decision moved. I imagine engineers moving from 'hold the line' against attacks routed through Cloudflare to 'sign the Cloudflare contract'. Roughly the time it took for the cost of continued outage to exceed the deal Cloudflare offered."

    Flying Penguin: Can Someone Please Explain Whether Cloudflare Blackmailed Canonical? flyingpenguin.com/can-someone- #infosec #Canonical #Ubuntu #Cloudflare

    @mttaggart

  2. [Перевод] 44 CVE в uutils: что Rust ловит, а что нет на границе с системой

    В апреле 2026 года Canonical раскрыла 44 CVE в uutils . Это переписанная на Rust версия GNU coreutils, которая в Ubuntu идёт по умолчанию с 25.10. Раскрытие пришло из внешнего аудита, заказанного перед релизом 26.04 LTS. Большую часть уязвимостей нашли обычным ревью кода. Ни borrow checker, ни проверки clippy , ни cargo audit не поймали ни одной. Этот аудит, пожалуй, самый чёткий из существующих примеров того, что Rust ловит, а что нет. Самый внятный разбор списка сделал Маттиас Эндлер в посте «Bugs Rust Won’t Catch» от 29 апреля. Эндлер ведёт консалтинг corrode и подкаст Rust in Production ; недавно у него в гостях был Джон Сигер, вице-президент по инженерии в Canonical. Пост построен как разбор того самого раскрытия: 44 CVE распределены по восьми категориям; к большинству приложен git diff фикса. Ниже разберу каркас Эндлера и добавлю два аргумента сверху. Первый: один из мейнтейнеров GNU coreutils в HN-треде показал бенчмарк, на котором рекомендованный Эндлером фикс не выживает. Второй: структурный аргумент про то, что 40 лет наслоённых POSIX-шрамов делают с любой переписью, независимо от языка.

    habr.com/ru/articles/1031420/

    #rust #cve #uutils #coreutils #canonical #ubuntu #toctou #безопасность #системное_программирование

  3. Sury's PPAs at Launchpad by @ubuntu seem to be finally working after 72+ hours of downtime:
    Get:5 ppa.launchpadcontent.net/ondre noble InRelease [24.3 kB]
    Hit:6 ppa.launchpadcontent.net/ondre noble InRelease
    Get:7 ppa.launchpadcontent.net/ondre noble/main amd64 Packages [2312 B]
    Get:8 ppa.launchpadcontent.net/ondre noble/main Translation-en [2032 B]

    Time to mirror these locally, so this grand, tragic single point of open source distribution failure never repeats!

    #ppa #ubuntu #php #canonical #ddos #opensource #fail

  4. Sury's PPAs at Launchpad by @ubuntu seem to be finally working after 72+ hours of downtime:
    Get:5 ppa.launchpadcontent.net/ondre noble InRelease [24.3 kB]
    Hit:6 ppa.launchpadcontent.net/ondre noble InRelease
    Get:7 ppa.launchpadcontent.net/ondre noble/main amd64 Packages [2312 B]
    Get:8 ppa.launchpadcontent.net/ondre noble/main Translation-en [2032 B]

    Time to mirror these locally, so this grand, tragic single point of open source distribution failure never repeats!

  5. Sury's PPAs at Launchpad by @ubuntu seem to be finally working after 72+ hours of downtime:
    Get:5 ppa.launchpadcontent.net/ondre noble InRelease [24.3 kB]
    Hit:6 ppa.launchpadcontent.net/ondre noble InRelease
    Get:7 ppa.launchpadcontent.net/ondre noble/main amd64 Packages [2312 B]
    Get:8 ppa.launchpadcontent.net/ondre noble/main Translation-en [2032 B]

    Time to mirror these locally, so this grand, tragic single point of open source distribution failure never repeats!

    #ppa #ubuntu #php #canonical #ddos #opensource #fail

  6. Sury's PPAs at Launchpad by @ubuntu seem to be finally working after 72+ hours of downtime:
    Get:5 ppa.launchpadcontent.net/ondre noble InRelease [24.3 kB]
    Hit:6 ppa.launchpadcontent.net/ondre noble InRelease
    Get:7 ppa.launchpadcontent.net/ondre noble/main amd64 Packages [2312 B]
    Get:8 ppa.launchpadcontent.net/ondre noble/main Translation-en [2032 B]

    Time to mirror these locally, so this grand, tragic single point of open source distribution failure never repeats!

    #ppa #ubuntu #php #canonical #ddos #opensource #fail

  7. CVE-2026-31431, also known as CopyFail, is a Local Privilege Escalation (LPE) vulnerability in which an attacker can escalate an already compromised and authenticated standard user to root privileges, which are the highest privileges on the host. This vulnerability affects most popular Linux distributions, as well as many virtualized and hardware environments where Linux is present.

    The vulnerability is present in the algif_aead module of the Linux kernel, which is responsible for hardware-accelerated cryptography. Canonical, the company behind Ubuntu, pushed out an update that disables the algif_aead module to mitigate the CopyFail vulnerability, however, Canonical notes that this mitigation will not be necessary once the kernel is updated.

    Disabling the affected module should make applications fallback from hardware-accelerated cryptography to userspace cryptographic functions. However, because of the complexity and variation of configurations across many environments, it is recommended to test this mitigation in staging first, as some applications may not include or support userspace cryptographic functions. A reboot is also recommended to complete the mitigation, as some applications may require a reboot to trigger the fallback.

    To protect systems running Ubuntu and Ubuntu-based distributions against this vulnerability, follow the steps below:

    Open a terminal and type:

    1. apt changelog kmod

    This checks the changelog for the version of the kmod tool currently installed on your system and shows a list of changes, which will confirm whether the CopyFail vulnerability was mitigated. Check the top entry to confirm the mitigation, as shown in the attached screenshot, if the top entry mentions "* Disable loading of algif_aead module to mitigate CVE-2026-31431", you already have the update installed that mitigates the CopyFail vulnerability but if there is no mention of the CVE, continue with the steps below.

    2. sudo apt-get update

    This will update your package index files so you can install newly released updates.

    3. sudo apt-get install --only-upgrade kmod

    This command will upgrade only kmod, a tool used to configure kernel modules on Ubuntu, the new release contains the mitigation for your current kernel.

    4. sudo reboot

    This will reboot the operating system.

    5. apt changelog kmod

    Repeat the command from the first step to confirm whether the mitigation is in place. The top entry should now say "* Disable loading of algif_aead module to mitigate CVE-2026-31431".

    #Ubuntu #Canonical #CopyFail #Linux #CVE #Mitigation #Cyber #CyberSecurity

  8. CVE-2026-31431, also known as CopyFail, is a Local Privilege Escalation (LPE) vulnerability in which an attacker can escalate an already compromised and authenticated standard user to root privileges, which are the highest privileges on the host. This vulnerability affects most popular Linux distributions, as well as many virtualized and hardware environments where Linux is present.

    The vulnerability is present in the algif_aead module of the Linux kernel, which is responsible for hardware-accelerated cryptography. Canonical, the company behind Ubuntu, pushed out an update that disables the algif_aead module to mitigate the CopyFail vulnerability, however, Canonical notes that this mitigation will not be necessary once the kernel is updated.

    Disabling the affected module should make applications fallback from hardware-accelerated cryptography to userspace cryptographic functions. However, because of the complexity and variation of configurations across many environments, it is recommended to test this mitigation in staging first, as some applications may not include or support userspace cryptographic functions. A reboot is also recommended to complete the mitigation, as some applications may require a reboot to trigger the fallback.

    To protect systems running Ubuntu and Ubuntu-based distributions against this vulnerability, follow the steps below:

    Open a terminal and type:

    1. apt changelog kmod

    This checks the changelog for the version of the kmod tool currently installed on your system and shows a list of changes, which will confirm whether the CopyFail vulnerability was mitigated. Check the top entry to confirm the mitigation, as shown in the attached screenshot, if the top entry mentions "* Disable loading of algif_aead module to mitigate CVE-2026-31431", you already have the update installed that mitigates the CopyFail vulnerability but if there is no mention of the CVE, continue with the steps below.

    2. sudo apt-get update

    This will update your package index files so you can install newly released updates.

    3. sudo apt-get install --only-upgrade kmod

    This command will upgrade only kmod, a tool used to configure kernel modules on Ubuntu, the new release contains the mitigation for your current kernel.

    4. sudo reboot

    This will reboot the operating system.

    5. apt changelog kmod

    Repeat the command from the first step to confirm whether the mitigation is in place. The top entry should now say "* Disable loading of algif_aead module to mitigate CVE-2026-31431".

    #Ubuntu #Canonical #CopyFail #Linux #CVE #Mitigation #Cyber #CyberSecurity

  9. Looks like the #snapstore is back online. My website update has now gone through! #ppa repos are still unavailable though.

    #snap #snapcraft #ubuntu #canonical

  10. Looks like the #snapstore is back online. My website update has now gone through! #ppa repos are still unavailable though.

    #snap #snapcraft #ubuntu #canonical

  11. Looks like the #snapstore is back online. My website update has now gone through! #ppa repos are still unavailable though.

    #snap #snapcraft #ubuntu #canonical

  12. Looks like the #snapstore is back online. My website update has now gone through! #ppa repos are still unavailable though.

    #snap #snapcraft #ubuntu #canonical

  13. Ein mutmaßlicher Cyberangriff hat zentrale Online-Dienste rund um das Linux-Betriebssystem Ubuntu und dessen Entwicklerfirma Canonical erheblich gestört. Canonical erklärte, dass die eigene Web-Infrastruktur Ziel eines anhaltenden, grenzüberschreitenden Angriffs sei. Man arbeite intensiv daran, die Situation unter Kontrolle zu bringen, und wolle weitere Informationen veröffentlichen, sobald diese verfügbar sind. 👇

    #ubuntu #canonical #down #ddos #cyberangriff #cybersecurity #linux

    teufelswerk.net/ubuntu-down-se

  14. Canonical/Ubuntu's servers have been battered by a 15-hour #DDoS assault, but fear not, their status page is a cryptic labyrinth of cookie warnings and timezone trivia! 🍪🕰️ Instead of fixing the issue, they've opted to drown users in consent banners and multilingual translations. 🌐🤦‍♂️
    status.canonical.com/#/inciden== #Canonical #Ubuntu #Cybersecurity #ConsentBanners #StatusPage #HackerNews #ngated

  15. Ubuntu moves AI roadmap local-first using open-weight models and on-device inference via snaps instead of cloud-first copilots. 🐧

    Canonical frames AI as opt-in and sandboxed.
    Would you want AI features built into your OS like this, or kept separate? 🔒

    🔗 itsfoss.com/news/ubuntu-is-get

    #TechNews #Ubuntu #Linux #AI #ArtificialIntelligence #OpenSource #Privacy #LocalAI #Canonical #Snaps #MachineLearning #FOSS #OnDeviceAI #DigitalRights

  16. @nivex I’ve had no regrets since I switched from #Ubuntu to #Debian years ago. (#Canonical was already bloating the OS and giving us hints that they might not be the good guys after all.) The systemd stuff has me a bit concerned and so I’m thinking about another shift to #Devuan… or maybe #NixOS if I’m feeling super-adventurous.

  17. Canonical lanza Ubuntu 26.04 LTS «Resolute Raccoon»: El futuro de Linux ya está aquí

    Canonical ha anunciado hoy el lanzamiento oficial de Ubuntu 26.04 LTS, apodado «Resolute Raccoon», una versión con soporte extendido que promete revolucionar el escritorio Linux con inteligencia artificial integrada y un núcleo optimizado para la máxima eficiencia (Fuente Canonical).

    https://youtu.be/ugIlNyRRkYY?si=2pp_hamMdIJqTStT

    Desarrollo La espera ha terminado para la comunidad de código abierto. Canonical ha presentado Ubuntu 26.04 LTS (Resolute Raccoon), la versión de soporte a largo plazo que definirá el ecosistema Linux durante los próximos años. Esta actualización destaca por ofrecer hasta 12 años de soporte (bajo el programa Ubuntu Pro), asegurando una estabilidad sin precedentes para empresas y usuarios avanzados. La gran novedad de esta edición es la integración nativa de un asistente de terminal basado en IA que ayuda a los usuarios a diagnosticar problemas y optimizar el sistema mediante lenguaje natural, simplificando la curva de aprendizaje para los recién llegados.

    Bajo el capó, «Resolute Raccoon» llega con el Kernel Linux 6.15, que mejora significativamente la gestión de energía en portátiles con procesadores de última generación y optimiza el rendimiento de los chips ARM. El entorno de escritorio predeterminado es GNOME 50, que introduce una interfaz de búsqueda global rediseñada y una gestión de ventanas mucho más fluida. Además, Canonical ha dado un paso adelante en la seguridad con «Confidential Computing» habilitado por defecto para servicios en la nube, garantizando que los datos sensibles estén protegidos incluso durante el procesamiento.

    En cuanto al software, la tienda de aplicaciones de Ubuntu ha sido reconstruida desde cero para priorizar la velocidad y la claridad, integrando de forma más armónica los paquetes Snap y Deb. Para los desarrolladores, esta versión incluye las últimas herramientas de programación, como Python 3.14, Go 1.26 y Rust 1.80, consolidándose como la plataforma de desarrollo preferida en el mundo del software libre. Ubuntu 26.04 LTS ya está disponible para su descarga gratuita en versiones Desktop, Server e IoT, marcando el inicio de una nueva era de computación confiable y moderna.

    #arielmcorg #Canonical #Devs #infosertec #innovación #linux #OpenSource #PORTADA #ResoluteRaccoon #SoftwareLibre #tecnología #ubuntu #Ubuntu2604
  18. Ubuntu 26.04 LTS “Resolute Raccoon” is released with GNOME 50, Linux 7.0 kernel, full Wayland shift, and updated core apps replacing legacy tools. 🦝
    The five-year supported release advances platform changes but drops X11 sessions, reinforcing modern stacks while raising compatibility and user choice considerations. 🔐

    🔗 fossforce.com/2026/04/ubuntu-2

    #TechNews #Ubuntu #Linux #Canonical #OpenSource #FOSS #GNOME #Wayland #LTS #Privacy #Security #Software #Desktop #Release #Computing #X11

  19. Canonical triumphantly announces the obvious: #RISC-V exists! 🎉 Next up, they'll reveal that the Earth orbits the Sun. 🌍☀️ Stay tuned for more groundbreaking insights, like water being wet, in their riveting newsletter. 📬✨
    ubuntu.com/blog/risc-v-101-wha #Canonical #EarthOrbitsSun #GroundbreakingInsights #TechNews #HackerNews #ngated

  20. linuxiac.com/canonical-plans-c

    Canonical wants to remove LUKS disk Encryption, LVM, most mid-raid modes, ZFS, BTRFS and many other file systems and image parsing abilities from GRUB in a recently announced, Planned change to Secure Boot, Supposedly for "security"

    In order to retain these features the system would need to not use secure Boot.

    Systems that don't use Secure Boot, or rely on the above features, can not upgrade to Ubuntu 26.10

    #Linux #OpenSource #Canonical #Ubuntu #Foss #Grub

  21. Today I published an update on the #Canonical supported #upki project, which brings browser-grade Public Key Infrastructure to Linux through the efficient #CRLite data format, with the core revocation engine now functional and available to test!

    Beyond current progress, this post explores broader integration, performance, and future capabilities like Certificate Transparency enforcement and Merkle Tree.

    This is all part of the effort to increase the resilience of #Ubuntu machines by default, but I hope it has a wider benefit on the Linux ecosystem going forward!

    discourse.ubuntu.com/t/77063

    #CertificateTransparency #PKI #Cryptography

  22. Just filed my first "real" merge proposal for major project.
    It's only a few lines of Python to enable striped LVs in Ubuntu Curtin installer. Probably made 10 mistakes in 5 lines, as it was a good while since I wrote anything in Python 🤦‍♂️
    But hey, at least I try to be the change I want to see!

  23. It's bizzare to me, that the curtin installer, which is designed by @ubuntu to automate server and desktop installs doesn't allow me to configure striped LVM. I even found where in the code it could be added:

    git.launchpad.net/curtin/tree/

    Line 1572, lvm_partition_handler, add if info.get('stripes') and cmd.extend(["--stripes", stripes])

    (of course this would need a change in info to get a "stripes" key from YAML, but this shouldn't be too hard)

  24. Ubuntu Linux firmasi rahallistakin säästöä ja vakautta lisääväksi voimanpesäksi Windowsin tilalle?

    Canonical (yhtiö Ubuntun takaa) on hiljan päättänyt että laitetaan sitä tukea kokonaiset 15 vuotta. Ei ole kiire eikä hätiämitiä.

    👉 ubuntu.com/blog/canonical-expa

    #Ubuntu #Linux #tuki #Canonical #firma #yritys #IT #duuni #toimisto #suomi

  25. Ey, #Canonical, wenn ihr dieses #Snap einführt als "konfliktfreie Alternative" zu #apt, tut es dann Not, dass manche Pakete, die man per apt installiert unter #Ubuntu, nur noch ein #Wrapper sind und dann doch das Snap installiert wird?

    Und wenn ihr das schon unbedingt machen wollt, wäre es dann zu viel verlangt, dass die Snap-Variante von z.B. #Brave oder #Chromium zumindest nicht funktionsreduziert ist gegenüber dem echten Paket?

    *hmpf*

  26. Ey, #Canonical, wenn ihr dieses #Snap einführt als "konfliktfreie Alternative" zu #apt, tut es dann Not, dass manche Pakete, die man per apt installiert unter #Ubuntu, nur noch ein #Wrapper sind und dann doch das Snap installiert wird?

    Und wenn ihr das schon unbedingt machen wollt, wäre es dann zu viel verlangt, dass die Snap-Variante von z.B. #Brave oder #Chromium zumindest nicht funktionsreduziert ist gegenüber dem echten Paket?

    *hmpf*

  27. Ey, #Canonical, wenn ihr dieses #Snap einführt als "konfliktfreie Alternative" zu #apt, tut es dann Not, dass manche Pakete, die man per apt installiert unter #Ubuntu, nur noch ein #Wrapper sind und dann doch das Snap installiert wird?

    Und wenn ihr das schon unbedingt machen wollt, wäre es dann zu viel verlangt, dass die Snap-Variante von z.B. #Brave oder #Chromium zumindest nicht funktionsreduziert ist gegenüber dem echten Paket?

    *hmpf*

  28. Ey, #Canonical, wenn ihr dieses #Snap einführt als "konfliktfreie Alternative" zu #apt, tut es dann Not, dass manche Pakete, die man per apt installiert unter #Ubuntu, nur noch ein #Wrapper sind und dann doch das Snap installiert wird?

    Und wenn ihr das schon unbedingt machen wollt, wäre es dann zu viel verlangt, dass die Snap-Variante von z.B. #Brave oder #Chromium zumindest nicht funktionsreduziert ist gegenüber dem echten Paket?

    *hmpf*

  29. has a well-known heart 🧡 that beats at different rates but always regularly and predictably. For the planning and engineering side of the house, it beats loudly and rapidly twice every six months.

    Between these two "heartbeats", I (and loads of other colleagues) have enjoyed a full day of roller coaster 🎢 rides at Liseberg 🇸🇪. It reminded me of my time in IT-Universitetet i København where was a regular weekend activity.

    PS: I don't recommend the Valkyria ride in rain 🌧️.

  30. Perinteinen kutsu testaukseen - Ubuntu 25.10 BETA (juuri sitä varten, ei siis tuotantokäyttöön) julkaistu 🔧 🔨 🧰

    Tämä esijulkaisu nyt erityisen tärkeä - seuraava Ubuntu on nimittäin *pitkän tuen* 26.04 LTS ("long term support") jota mm. yritykset käyttävät sitten jopa 10+ vuotta.

    Canonical:in toimittama virallinen beta-levykuva 👉 releases.ubuntu.com/25.10
    Julkistus 👉 lists.ubuntu.com/archives/ubun

    #Ubuntu #beta #testi #kehitys #Linux #suomi #suomentaminen #Canonical

  31. Canonical Makes Advanced Intel GPU Support Available on Ubuntu 24.04

    Ubuntu 24.04 LTS users can make use of the Intel Graphics Preview to unlock support for newer Intel GPU features, like faster ray tracing and ML.
    #News #Canonical #Intel #Ppas #Ubuntu24_04Lts

    :sys_omgubuntu: omgubuntu.co.uk/2025/05/ubuntu

  32. Ubuntun uudet julkaisut toimitetaan nyt aina tuoreella Linux-ytimellä ✅ 🐧

    "Tämä lähestymistapa osoittautui tehokkaaksi uusimpien ominaisuuksien- ja laitteistotuen toimittamisessa käyttäjillemme. Seurauksena sitoudumme jatkamaan kyseistä käytäntöä kun Ubuntu 25.10 julkaistaan - silloinkin vaikka ytimen varsinainen kehitystaho olisi määritellyt ytimen vasta julkaisuehdokkaaksi (RC) julkaisuhetkellä" ~Kleber Souza, Canonical

    👉 discourse.ubuntu.com/t/announc

    #Ubuntu #Linux #ydin #Canonical #kehitys #PC

  33. 🎉 Tapahtumat | Ubuntu Summit '24 (Haag, Hollanti) paketissa 🍊

    3 päivää kattavia esitelmiä ohjelmistokehityksestä, uusista innovaatioista, yleiskäytöstä & upean yhteisön voimavaroista.

    Käyttäjät ja kehittäjät 🤝

    (Alunperin suorat) lähetykset kokonaisuudessaan 25 - 27.10:

    Perjantai►youtu.be/LPCg0NcQICQ
    Lauantai►youtu.be/ZNK4aSv-krI
    Sunnuntai►youtu.be/byPpJW5l6pg

    #UbuntuSummit #Linux #kokoontumiset #tapahtumat #kehitys #ohjelmistot #suomi #YouTube #Canonical #PC #mobiili #UBPorts