u/system76_com

Ubuntu 26.04 LTS is now available pre-loaded on System76 hardware

Ubuntu 26.04 LTS is now available pre-loaded on System76 hardware

It's been a journey. DDOS attacks on Ubuntu's infrastructure slowed things down, so rather than wait around, we built new infrastructure and cut our Launchpad dependency entirely. The upside: future releases move faster.

When you configure your next machine, you can now choose from:

• Ubuntu 26.04 LTS (new!) • Ubuntu 24.04 LTS • Pop!_OS 24.04 LTS with COSMIC DE (our favorite!)

reddit.com
u/system76_com — 1 day ago
▲ 47 r/System76+1 crossposts

The Verge covers how Linux devs are responding to the new wave of age-gating legislation

The Verge has a solid write-up on how age-verification laws are creating an unexpected problem for the Linux and open-source ecosystem.

Bills like California's AB 1043 and Colorado's SB26-051 were written with commercial app stores and operating systems in mind, but their broad language could rope in open-source projects that were never built to collect user data, lack the resources to implement compliance measures, and could see any age-gating code forked out anyway.

Carl Richell of System76/Pop!_OS also weighs in on why this matters beyond just compliance: "Many of these bills are written without a deep understanding of how open-source software is developed and distributed. When developers and users engage early and explain the mechanics, it helps policymakers see where broad requirements could create unintended consequences."

Worth a read, especially with similar legislation moving in Illinois and New York.

Here's a gift link to the article by Stevie Bonifield, The Verge. Valid for the next 4 days.

u/system76_com — 7 days ago
▲ 79 r/pop_os

Linux Zero-Day Dirty Frag and Copy Fail Vulnerability Fixes Released

Linux Zero-Day Dirty Frag and Copy Fail Vulnerability Fixes Released

Pop!_OS 22.04 LTS and Pop!_OS 24.04 LTS kernels have been patched for Dirty Frag and Copy Fail zero-day local privilege escalation vulnerabilities. Install updates to apply the fixes.

Dirty Frag (CVE-2026-43284)

The affected rxrpc, esp4, and esp6 kernel modules have been disabled in the Pop!_OS kernel update. Once rxrpc kernel patches are approved upstream, new kernels will be released with the modules re-enabled.

espr4 and esp6 kernel modules were patched and are safe to re-enable. We are keeping them disabled to see if upstream's backports find other places to make changes.

The Alfred File System (AFS) uses the rxrpc module. esp4 and esp6 are used by some VPN implementations like StrongSwan. If you require these modules, delete the file located at /etc/modprobe.d/pop-default-settings-dirty-frag.conf and run the command:

sudo update-initramfs -u -k all

Copy Fail (CVE-2026-31431)

Copy Fail patched kernels were released on Pop!_OS 22.04 LTS, Pop!_OS 24.04 LTS on April 30th.

reddit.com
u/system76_com — 14 days ago