{"id":460628,"date":"2026-04-30T01:39:10","date_gmt":"2026-04-30T01:39:10","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/460628\/"},"modified":"2026-04-30T01:39:10","modified_gmt":"2026-04-30T01:39:10","slug":"linux-cryptographic-code-flaw-offers-fast-route-to-root-the-register","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/460628\/","title":{"rendered":"Linux cryptographic code flaw offers fast route to root \u2022 The Register"},"content":{"rendered":"<p>Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising from a logic flaw.<\/p>\n<p>The newly disclosed LPE, dubbed <a href=\"https:\/\/copy.fail\" rel=\"nofollow noopener\" target=\"_blank\">Copy Fail<\/a> (CVE-2026-31431), comes from a vulnerability in the Linux kernel&#8217;s authencesn cryptographic template.<\/p>\n<p>&#8220;An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root,&#8221; the writeup from security biz <a href=\"https:\/\/theori.io\" rel=\"nofollow noopener\" target=\"_blank\">Theori<\/a> explains.<\/p>\n<p>The kernel reads the page cache when it loads a binary, so modifying the cached copy amounts to altering the binary for the purpose of program execution. But doing so doesn&#8217;t trigger any defenses focused on file system events like <a href=\"https:\/\/man7.org\/linux\/man-pages\/man7\/inotify.7.html\" rel=\"nofollow noopener\" target=\"_blank\">inotify<\/a>.<\/p>\n<p>The <a href=\"https:\/\/github.com\/theori-io\/copy-fail-CVE-2026-31431\/blob\/main\/copy_fail_exp.py\" rel=\"nofollow noopener\" target=\"_blank\">proof of concept exploit<\/a> is a 10-line, 732-byte Python script capable of editing a setuid binary to gain root on almost all Linux distributions released since 2017.<\/p>\n<p>Copy Fail is similar to other LPE bugs such as Dirty Cow and Dirty Pipe, but its finders claim it doesn&#8217;t require winning a race condition and it&#8217;s more broadly applicable.<\/p>\n<p>It&#8217;s not remotely exploitable on its own \u2013 hence LPE \u2013 but if chained with a web RCE, malicious CI runner, or SSH compromise, it could be relevant to an external attacker. The bug is of most immediate concern to those using multi-tenant Linux systems, shared-kernel containers, or CI runners that execute untrusted code.<\/p>\n<p>According to Theori, the vulnerability also represents a potential container escape primitive that could affect Kubernetes nodes, because the page cache is shared across the host.<\/p>\n<p>Linux distros <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2026-31431\" rel=\"nofollow noopener\" target=\"_blank\">Debian<\/a>, <a href=\"https:\/\/ubuntu.com\/security\/CVE-2026-31431\" rel=\"nofollow noopener\" target=\"_blank\">Ubuntu<\/a>, and <a href=\"https:\/\/www.suse.com\/security\/cve\/CVE-2026-31431.html\" rel=\"nofollow noopener\" target=\"_blank\">SUSE<\/a> have issued patches for the problem, as have overseers of other distros.<\/p>\n<p>Red Hat initially said it was going to <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/news.ycombinator.com\/item?id=47953340\">defer the fix<\/a> but later changed its<\/p>\n<p><a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2026-31431\" rel=\"nofollow noopener\" target=\"_blank\">guidance<\/a> to indicate it will go along with other distros and patch promptly.<\/p>\n<p>The CVE has been rated High severity, <a href=\"https:\/\/github.com\/advisories\/GHSA-2274-3hgr-wxv6\" rel=\"nofollow noopener\" target=\"_blank\">7.8 out of 10<\/a>.<\/p>\n<p>Theori researcher Taeyang Lee identified the vulnerability, with the help of the company&#8217;s AI security scanning software, Xint Code.<\/p>\n<p>The number of bug reports has surged in recent months, helped by <a href=\"https:\/\/www.theregister.com\/2026\/04\/06\/ai_coding_tools_more_work\/\" rel=\"nofollow noopener\" target=\"_blank\">AI-powered flaw-finders<\/a>. Microsoft just reported the second largest number of patches ever.<\/p>\n<p>Dustin Childs, head of threat awareness for Trend Micro&#8217;s Zero Day Initiative, expects this is due to security teams using AI to hunt bugs. &#8220;There are many things we could speculate on to justify the size, but if Microsoft is like the other programs out there (including ours), they are likely seeing a rise in submissions found by AI tools,&#8221; he <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2026\/4\/14\/the-april-2026-security-update-review\" rel=\"nofollow noopener\" target=\"_blank\">wrote<\/a> earlier this month.<\/p>\n<p>AI-assisted vulnerability research recently prompted the Internet Bug Bounty (IBB) program to suspend awards until it can understand how to manage the growing volume of reports. \u00ae<\/p>\n","protected":false},"excerpt":{"rendered":"Developers of major Linux distributions have begun shipping patches to address a local privilege escalation (LPE) vulnerability arising&hellip;\n","protected":false},"author":2,"featured_media":460629,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[18,19,17,82],"class_list":{"0":"post-460628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-eire","9":"tag-ie","10":"tag-ireland","11":"tag-technology"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ie\/116491109357402537","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/460628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=460628"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/460628\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/460629"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=460628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=460628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=460628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}