Announcement: Canonical Ubuntu Server Outages and Status

May 4th 2026 05:00pm EDT - All components are Operational

Note: Terminal updating appears slow and might take awhile for full functionality.


May 4th 2026 (estimate around 12:00pm EDT) - Components ppa.launchpadcontent and Security not working past few hours.


May 4th 2026 - 03:29am EDT - All services operational. ppa.launchpad seems to be up and running with no fail/error warnings thru terminal. :crossed_fingers:


May 3rd, 2026 - 05:30pm EDT Still more ongoing issues at Canonical that prevents updating. Ubuntu Launchpad component not fully functional.


As of Sunday 04:36am EDT
All services operational:

https://status.canonical.com/


May 1st, 2026 - Canonical’s web infrastructure is under a sustained, cross-border attack and we are working to address it. We will provide more information in our official channels as soon as we are able to.

https://status.canonical.com/#/incident_history

6 Likes

Today there are problems with ubuntu servers:

https://www.reddit.com/r/Ubuntu/comments/1t0kamn/is_launchpad_down/

2 Likes

Thanks for the information! I was starting to think I botched the OS again...

I believe we should pin this info until the Ubuntu servers issue is resolved, as it would save some time and frustration to many of us.

4 Likes

I think they are having excessive hits over this:

I tried accessing Ubuntu's security page and did get a brief glimpse. The threat appears to require a bad player to have physical access to a machine in order to carry out this attack which should suggest home users to not have an issue. I suspect where it is a threat would be on a network, connected to a Linux Server. The article also mentions a Word Press vulnerability and WSL (the latter had a security flaw in its first iteration) which potentially affects Windows users running GNU/Linux using WSL (Windows Support (for) Linux).

I do feel Arstechnica have gone overkill on this.

A wag on Reddit posted that the company raising the vulnerability is an A.I. company always promoting its wares.

" CVE-2026-31431 , nicknamed "Copy Fail" , is a critical local privilege escalation vulnerability in the Linux kernel's algif_aead cryptographic interface. Discovered by Theori researcher Taeyang Lee and scaled by the Xint Code Research Team , this logic flaw allows any unprivileged local user to gain root access on virtually all major Linux distributions (including Ubuntu, RHEL, Amazon Linux, and SUSE) that have been shipped since 2017 .

The vulnerability stems from an optimization introduced in August 2017 (commit 72548b093ee3 ) that switched AEAD operations to in-place processing. This change inadvertently allowed the kernel to chain tag pages from the source scatterlist into the output scatterlist. When a user feeds an AF_ALG socket through the splice() syscall, these tag pages reference the page cache of the spliced file. Consequently, a four-byte write intended for cryptographic scratch space can corrupt the page cache of any readable file, including setuid binaries like /usr/bin/su .

Key details of the vulnerability include:

  • Exploit Simplicity : The flaw can be exploited using a 732-byte Python script (Python 3.10+, stdlib only) that requires no race conditions, kernel offsets, or distribution-specific tuning.
  • Reliability : Unlike previous exploits such as Dirty Pipe (CVE-2022-0847), Copy Fail is a straight-line logic error that triggers reliably across different kernel versions and distributions.
  • Affected Versions : The vulnerability affects Linux kernel versions 4.14 through 7.0-rc , specifically all 6.18.x versions prior to 6.18.22 and 6.19.x prior to 6.19.12 . Older LTS lines (e.g., 6.12.x, 6.6.x) are also vulnerable if they include the backported code.
  • Fix : The issue was resolved by reverting the in-place operation back to out-of-place processing. Fixed kernel versions include 7.0 , 6.19.12 , and 6.18.22 .
  • Disclosure Timeline : The vulnerability was reported to the Linux kernel security team on March 23, 2026 , with patches committed to mainline on April 1, 2026 , and public disclosure occurring on April 29, 2026 .
  • Mitigation : Until kernels are updated, administrators should restrict AF_ALG socket creation via seccomp profiles or deploy runtime detection rules (such as those for Falco) to flag unexpected AF_ALG socket creation by unprivileged processes.

AI-generated answer. Please verify critical facts."

1 Like

https://status.canonical.com/ for updates on server status durning this time of cross boarder attacks

The status of canonical is also down...

1 Like

Perhaps it is possibly a state sponsored attack. Only time will tell.

1 Like

Not for me.

I mean, there are shown no current informations (the whole day today).

That is what that announcement indicates. I had a similar issue some months ago with SoftMaker forum being under heavy DDoS attacks preventing me from logging in.

2 Likes

Its Microslop!!!!...they mad!!!!....lol

4 Likes

I have pinned it. For now till Monday.

Maybe not so fast with these kind of Ideas.

6 Likes

More details here. Iran-related. Link: Pro-Iran group turns Ubuntu DDoS into shakedown • The Register

5 Likes

Hmm ... but why does such a Group selected Canonical? I mean, I could understand when they would have chosen something like Microsoft but Canonical?

2 Likes

Earlier today I kept wondering what gives. My gut feeling told me probably something to do with Iran, and sure enough it is.

3 Likes

Because it is based in the UK and once the UK allowed US Bombers to fly from UK Airbases UK became a target.

2 Likes

I don't understand the meaning of their incident reporting. The header of each incident in red states "down" and underneath "All components are operational".

3 Likes

It does appear to be confusing. I'm trying to dissect it. I think the header is just an alert announcement? Then when you click on header, it shows the entire timeline of the events showing the various components that seem to be down and others that are working. Their blog site is now up whereas hours before it was down.

2 Likes

But they don't only fly from the UK. But okay.

4 Likes