U.S. CISA adds a flaw in Linux Kernel to its Known Exploited Vulnerabilities catalog


U.S. CISA adds a flaw in Linux Kernel to its Known Exploited Vulnerabilities catalog

Pierluigi Paganini
May 04, 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Linux Kernel to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in the Linux Kernel, tracked as CVE-2026-31431 (CVSS score of 7.8), to its Known Exploited Vulnerabilities (KEV) catalog.

Recently, Xint Code researchers warned of a serious Linux flaw, tracked as CVE-2026-31431, dubbed Copy Fail. It lets any local, unprivileged user write four controlled bytes into the page cache of any readable file, enabling escalation to root on major distributions.

The bug combines AF_ALG and splice() to write 4 bytes into the page cache of any readable file. A 732-byte script can modify a setuid binary in memory, without changing the file on disk, making detection difficult. The issue affects major distributions like Ubuntu, RHEL, SUSE, and Amazon Linux, and can even cross container boundaries due to shared page cache.

Copy Fail (CVE-2026-31431) is a logic bug in the Linux kernel’s authencesn cryptographic template. It lets an unprivileged local user trigger a deterministic, controlled 4-byte write into the page cache of any readable file on the system.” reads the report published by Xint Code. “A single 732-byte Python script can edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017.

Copy Fail exploits a kernel logic flaw where corrupted page‑cache data is never marked dirty, leaving disk files unchanged while the in‑memory version is silently altered. Because the page cache is what processes read, an unprivileged user can corrupt a setuid binary’s cached page and gain root. The shared cache also lets the attack cross container boundaries. The bug, surfaced through AI‑assisted analysis of crypto‑subsystem behavior, is portable, tiny, race‑free, and stealthy, unlike Dirty Cow or Dirty Pipe. It works across major distros and architectures and forms the basis for both local privilege escalation and Kubernetes container escapes.

The bug starts in AF_ALG, which lets any user access the kernel crypto subsystem without privileges. Attackers use splice() to map file page cache pages directly into a crypto scatterlist, so operations act on real file-backed memory. During AEAD decryption, the kernel sets the operation in-place, mixing user buffers with page cache pages in one writable structure.

The authencesn algorithm breaks expectations: it uses the output buffer as scratch space and writes 4 bytes past the allowed boundary. In this setup, that write lands directly in the page cache of a chosen file. Attackers control the file, offset, and value, enabling precise memory corruption and privilege escalation.

This flaw emerged from combined changes over years, authencesn design, AF_ALG support, and a 2017 in-place optimization, creating a long-hidden but critical vulnerability.

The exploit targets /usr/bin/su, a common setuid-root binary on Linux systems.

  • First, the attacker opens an AF_ALG socket and binds it to the vulnerable authencesn AEAD mode. No privileges are required. The attacker sets a cryptographic key and creates a request socket.
  • Next, the attacker prepares each 4-byte write. The AAD carries the exact 4-byte value to inject, while splice() maps page cache pages from the target file into the crypto operation. Carefully chosen parameters force the kernel to treat a specific offset inside /usr/bin/su as writable memory.
  • Then the attacker triggers recv(), which runs the decrypt operation. The kernel reads AAD data, performs the authencesn scratch write, and copies 4 bytes into the page cache of the target binary. The HMAC fails, but the corrupted memory remains. The process repeats until enough shellcode is injected into the cached binary.
  • Finally, the attacker runs execve("/usr/bin/su"). The kernel loads the modified version from the page cache instead of disk. Since su runs with setuid-root privileges, the injected code executes as root, giving full system control.

The researchers published a demo showing the same 732-byte exploit run on four Linux distributions, where a normal user (uid 1001) consistently gains root access. Tested systems include Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, and SUSE 16, covering kernel versions 6.12 to 6.18, all successfully compromised.

“If your kernel was built between 2017 and the patch — which covers essentially every mainstream Linux distribution — you’re in scope.” the researchers wrote. “Copy Fail requires only an unprivileged local user account — no network access, no kernel debugging features, no pre-installed primitives. The kernel crypto API (AF_ALG) ships enabled in essentially every mainstream distro’s default config, so the entire 2017 → patch window is in play out of the box.”

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerability by May 15, 2026.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, US CISA Known Exploited Vulnerabilities catalog)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Pool maintenance has long existed in a fragmented state, where different tools solve different problems but rarely work together in a meaningful way. Cleaning the floor, clearing the surface, and maintaining water quality have traditionally required separate interventions, often at different times. What has been missing is a system that not only automates these tasks but also connects them through intelligence.

The Aiper Experts Duo introduces that shift by combining two purpose-built robots, the Scuba V3 and the EcoSurfer S2, into a single, coordinated ecosystem. Instead of operating in isolation, these devices function as a unified system that covers every layer of the pool, from the floor and walls to the waterline and surface.

At the center of this system is Cognitive AI

This moves beyond pre-programmed cleaning cycles and into continuous optimization. The technology works as an adaptive loop that enables the robots to interpret their surroundings, make decisions in real time, and refine their behavior based on past performance. By factoring in variables such as pool size, weather conditions, and cleaning history, the system evolves with use, delivering a level of precision that static automation cannot match. Within the Aiper Experts Duo, these AI-driven capabilities are associated with the Scuba V3, where features such as adaptive cleaning modes, real-time debris detection, and intelligent path planning support navigation and cleaning across the pool’s floor, walls, and waterline.

This intelligence becomes most apparent in how the system manages time and consistency. The EcoSurfer S2 operates using SolarSeeker™ technology, allowing it to maintain surface cleaning throughout the day while intelligently seeking sunlight to sustain its energy levels. At the same time, the Scuba V3 uses AI Navium™ Mode to generate weekly cleaning plans automatically, removing the need for manual scheduling and ensuring the pool remains consistently maintained.

Performance is not just about automation but about efficiency

The Scuba V3’s AI Patrol Cleaning identifies visible debris in real time and adjusts its route accordingly, delivering up to 10× faster cleaning compared to traditional cleaners that rely on standard S-shape floor patterns.  By responding dynamically to what it detects, the system ensures that cleaning is both targeted and time-efficient. This is supported by VisionPath™ technology, which integrates AI vision with advanced sensors to map efficient paths, reduce overlap, and navigate obstacles without unnecessary repetition.

This is supported by VisionPath, which combines an initial AI-led cleaning phase that focuses on visible debris with a structured grid-pattern cleaning of the entire pool floor. The result is a balanced approach that brings together speed and consistency, ensuring that immediate cleaning needs are addressed while still delivering complete and reliable coverage.

The system’s effectiveness also comes from its ability to deliver complete coverage without compromise. While the Scuba V3 handles deep cleaning across the pool’s structure, the EcoSurfer S2 maintains the surface and supports water quality through its adjustable chlorine tablet chamber. Together, they create a continuous maintenance cycle that addresses both visible debris and underlying water balance. Features such as MicroMesh™ filtration capture even ultra-fine particles, while DebrisGuard™ ensures that collected debris remains contained.

Reliability is built into the design through both engineering and architecture

By distributing tasks across two specialized devices, the system reduces wear and improves long-term durability. Combined with solar-assisted operation and energy-efficient path planning, this approach ensures consistent performance while significantly reducing the need for hands-on maintenance, including frequent charging or manual intervention.

For homeowners increasingly investing in connected, more carefree and reliable living environments, this represents a more complete approach to outdoor automation. The Aiper Experts Duo does not simply reduce the effort required to maintain a pool; it removes the need to think about it altogether, allowing maintenance to happen seamlessly in the background.

To explore the system further, visit the official product page:
https://aiper.store/us/products/aiper-experts-duo

As part of the ongoing spring promotion, customers can access savings of up to 25 percent,  available through April 10. In addition, an extra 5 percent discount is available at checkout using the code AiperExpertsDuoXDT, valid through April 25, making this a timely opportunity to transition to a more intelligent and fully integrated pool care system.



Source link