Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. So CopyFail CVE-2026-31431 is a thing.

So CopyFail CVE-2026-31431 is a thing.

Scheduled Pinned Locked Moved Uncategorized
174 Posts 63 Posters 14 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rootwyrm@weird.autosR rootwyrm@weird.autos

    @marshray @wdormann the PoC works against the kernel and I already tweaked it as necessary for musl.

    What I'm seeing in musl is that it appears to be failing at step 3 with all suid binaries (I tried several,) possibly because they all set BIND_NOW, or because they don't link against the kernel.

    marshray@infosec.exchangeM This user is from outside of this forum
    marshray@infosec.exchangeM This user is from outside of this forum
    marshray@infosec.exchange
    wrote last edited by
    #13

    @rootwyrm @wdormann https://hachyderm.io/@dalias/116490206427142497

    1 Reply Last reply
    0
    • wdormann@infosec.exchangeW wdormann@infosec.exchange

      Or RHEL.
      I suspect that some people use that?

      Link Preview Image
      scorpion8741@infosec.exchangeS This user is from outside of this forum
      scorpion8741@infosec.exchangeS This user is from outside of this forum
      scorpion8741@infosec.exchange
      wrote last edited by
      #14

      @wdormann

      It's even better, the suggested mitigation does not work on RHEL-family systems: https://x.com/grsecurity/status/2049610274840158481?s=20

      1 Reply Last reply
      0
      • wdormann@infosec.exchangeW wdormann@infosec.exchange

        Or RHEL.
        I suspect that some people use that?

        Link Preview Image
        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchange
        wrote last edited by
        #15

        While this vulnerability seems to be discovered using AI ("Xint Code"), I have to assume that they also let the AI decide how to do the vulnerability coordination as well.

        • major builds are out as of this writing πŸ˜‚

          No distros have official updates for CVE-2026-31431. Fedora 42 and newer have updates, but no official advisory or acknowledgement of CVE-2026-31431. So with them it's unclear if it's even intentional. Red Hat, Ubuntu, Amazon Linux, and Suse all have advisories as of now, but NO updates.

        • disable the algif_aead module as a mitigation. πŸ˜‚

          Bespoke distros like RHEL don't use a module, it's compiled into the kernel.

        I can't figure out what the Xint Code angle is with this copyfail stuff. On one hand, yes, it is a true vulnerability that affects a LOT of Linux distros available. And they did submit the bug for fixing to the upstream kernel people.

        BUT the CVE has only existed for a week. And NONE of the distros IN THEIR ADVISORY had updates available at the time that they pulled the trigger for publication of the shiny copy.fail website.

        I struggle to think of how this even happens. In all my years of infosec, you're either on board with doing CVD (e.g. coordinating with the former CERT/CC) or you're not (dropping 0day). But this all fits bizarrely in the middle. The publication gives the guise that they did the right thing, (and please use our AI services). But at the same time, they clearly chose to release the vulnerability details and functional exploit before any distro had the ability to properly do anything about it.

        Either these Xint Code (Theori) people have a hidden agenda or ulterior motive that we aren't aware of yet. Or they're just really bad at coordinated vulnerability disclosure. You pick.

        wdormann@infosec.exchangeW squaloujenkins@fosstodon.orgS chaz6@ipv6.socialC jtig@infosec.exchangeJ k8ie@toot.mcld.euK 8 Replies Last reply
        0
        • wdormann@infosec.exchangeW wdormann@infosec.exchange

          While this vulnerability seems to be discovered using AI ("Xint Code"), I have to assume that they also let the AI decide how to do the vulnerability coordination as well.

          • major builds are out as of this writing πŸ˜‚

            No distros have official updates for CVE-2026-31431. Fedora 42 and newer have updates, but no official advisory or acknowledgement of CVE-2026-31431. So with them it's unclear if it's even intentional. Red Hat, Ubuntu, Amazon Linux, and Suse all have advisories as of now, but NO updates.

          • disable the algif_aead module as a mitigation. πŸ˜‚

            Bespoke distros like RHEL don't use a module, it's compiled into the kernel.

          I can't figure out what the Xint Code angle is with this copyfail stuff. On one hand, yes, it is a true vulnerability that affects a LOT of Linux distros available. And they did submit the bug for fixing to the upstream kernel people.

          BUT the CVE has only existed for a week. And NONE of the distros IN THEIR ADVISORY had updates available at the time that they pulled the trigger for publication of the shiny copy.fail website.

          I struggle to think of how this even happens. In all my years of infosec, you're either on board with doing CVD (e.g. coordinating with the former CERT/CC) or you're not (dropping 0day). But this all fits bizarrely in the middle. The publication gives the guise that they did the right thing, (and please use our AI services). But at the same time, they clearly chose to release the vulnerability details and functional exploit before any distro had the ability to properly do anything about it.

          Either these Xint Code (Theori) people have a hidden agenda or ulterior motive that we aren't aware of yet. Or they're just really bad at coordinated vulnerability disclosure. You pick.

          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchange
          wrote last edited by
          #16

          If you're curious about IOCs for copyfail, look in syslog for:
          NET: Registered PF_ALG protocol family
          for attempts to exploit copyfail on systems that use the vulnerable code as a module. For systems that have the vulnerable code compiled into the kernel, like RHEL, you'll see this line on every boot.
          And at least for this particular flavor of exploit, a wall-clock nearby:
          process 'su' launched '/bin/sh with NULL argv: empty string added`
          is an indication of successful exploitation.

          But it's worth noting that the "process launched" stuff is merely what this one ITW PoC will leave behind. Other exploitation techniques do not provide the above.

          As such, perhaps looking for alg: No test for authencesn is perhaps more useful for looking for evidence of the affected endpoint being used.

          Link Preview Image
          cliffsesport@mastodon.socialC patpro@social.patpro.netP wdormann@infosec.exchangeW 3 Replies Last reply
          0
          • wdormann@infosec.exchangeW wdormann@infosec.exchange

            If you're curious about IOCs for copyfail, look in syslog for:
            NET: Registered PF_ALG protocol family
            for attempts to exploit copyfail on systems that use the vulnerable code as a module. For systems that have the vulnerable code compiled into the kernel, like RHEL, you'll see this line on every boot.
            And at least for this particular flavor of exploit, a wall-clock nearby:
            process 'su' launched '/bin/sh with NULL argv: empty string added`
            is an indication of successful exploitation.

            But it's worth noting that the "process launched" stuff is merely what this one ITW PoC will leave behind. Other exploitation techniques do not provide the above.

            As such, perhaps looking for alg: No test for authencesn is perhaps more useful for looking for evidence of the affected endpoint being used.

            Link Preview Image
            cliffsesport@mastodon.socialC This user is from outside of this forum
            cliffsesport@mastodon.socialC This user is from outside of this forum
            cliffsesport@mastodon.social
            wrote last edited by
            #17

            @wdormann Sigh, as nerd with a homelab working on really understanding stuff this chaos and lack of documentation doesn't help. From what your saying my main 4 distros are all impacted w no patches in sight. My distros, picked in part to mitigate single point of failure of an individual distro: Mint, MX, Kinoite (Fedora immutable), and Manjaro.

            wdormann@infosec.exchangeW 1 Reply Last reply
            0
            • wdormann@infosec.exchangeW wdormann@infosec.exchange

              If you're curious about IOCs for copyfail, look in syslog for:
              NET: Registered PF_ALG protocol family
              for attempts to exploit copyfail on systems that use the vulnerable code as a module. For systems that have the vulnerable code compiled into the kernel, like RHEL, you'll see this line on every boot.
              And at least for this particular flavor of exploit, a wall-clock nearby:
              process 'su' launched '/bin/sh with NULL argv: empty string added`
              is an indication of successful exploitation.

              But it's worth noting that the "process launched" stuff is merely what this one ITW PoC will leave behind. Other exploitation techniques do not provide the above.

              As such, perhaps looking for alg: No test for authencesn is perhaps more useful for looking for evidence of the affected endpoint being used.

              Link Preview Image
              patpro@social.patpro.netP This user is from outside of this forum
              patpro@social.patpro.netP This user is from outside of this forum
              patpro@social.patpro.net
              wrote last edited by
              #18

              @wdormann
              Ok for Ubuntu, but I can’t find the first one on RHEL 10, instead I have:
              kernel: alg: No test for authencesn(hmac(sha256),cbc(aes)) (authencesn(hmac(sha256-avx2),cbc-aes-aesni))

              wdormann@infosec.exchangeW 1 Reply Last reply
              0
              • patpro@social.patpro.netP patpro@social.patpro.net

                @wdormann
                Ok for Ubuntu, but I can’t find the first one on RHEL 10, instead I have:
                kernel: alg: No test for authencesn(hmac(sha256),cbc(aes)) (authencesn(hmac(sha256-avx2),cbc-aes-aesni))

                wdormann@infosec.exchangeW This user is from outside of this forum
                wdormann@infosec.exchangeW This user is from outside of this forum
                wdormann@infosec.exchange
                wrote last edited by
                #19

                @patpro
                RHEL will have NET: Registered PF_ALG protocol family in the log on boot, as it's built into the kernel.
                Not as a kernel module.

                patpro@social.patpro.netP 1 Reply Last reply
                0
                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                  @patpro
                  RHEL will have NET: Registered PF_ALG protocol family in the log on boot, as it's built into the kernel.
                  Not as a kernel module.

                  patpro@social.patpro.netP This user is from outside of this forum
                  patpro@social.patpro.netP This user is from outside of this forum
                  patpro@social.patpro.net
                  wrote last edited by
                  #20

                  @wdormann OK so in that case it can’t be seen as an IOC on RHEL, is that correct?

                  wdormann@infosec.exchangeW 1 Reply Last reply
                  0
                  • patpro@social.patpro.netP patpro@social.patpro.net

                    @wdormann OK so in that case it can’t be seen as an IOC on RHEL, is that correct?

                    wdormann@infosec.exchangeW This user is from outside of this forum
                    wdormann@infosec.exchangeW This user is from outside of this forum
                    wdormann@infosec.exchange
                    wrote last edited by
                    #21

                    @patpro
                    Correct.
                    That's what I indicated in my post.

                    for attempts to exploit copyfail on systems that use the vulnerable code as a module

                    patpro@social.patpro.netP 1 Reply Last reply
                    0
                    • wdormann@infosec.exchangeW wdormann@infosec.exchange

                      @patpro
                      Correct.
                      That's what I indicated in my post.

                      for attempts to exploit copyfail on systems that use the vulnerable code as a module

                      patpro@social.patpro.netP This user is from outside of this forum
                      patpro@social.patpro.netP This user is from outside of this forum
                      patpro@social.patpro.net
                      wrote last edited by
                      #22

                      @wdormann perfect, thank you.

                      1 Reply Last reply
                      0
                      • cliffsesport@mastodon.socialC cliffsesport@mastodon.social

                        @wdormann Sigh, as nerd with a homelab working on really understanding stuff this chaos and lack of documentation doesn't help. From what your saying my main 4 distros are all impacted w no patches in sight. My distros, picked in part to mitigate single point of failure of an individual distro: Mint, MX, Kinoite (Fedora immutable), and Manjaro.

                        wdormann@infosec.exchangeW This user is from outside of this forum
                        wdormann@infosec.exchangeW This user is from outside of this forum
                        wdormann@infosec.exchange
                        wrote last edited by
                        #23

                        @CliffsEsport
                        All of those are vulnerable except for Fedora, if it has updates installed.
                        If you're the only user of these systems, then you have much less to worry about than multi-user systems.

                        letoams@defcon.socialL cliffsesport@mastodon.socialC 2 Replies Last reply
                        0
                        • wdormann@infosec.exchangeW wdormann@infosec.exchange

                          While this vulnerability seems to be discovered using AI ("Xint Code"), I have to assume that they also let the AI decide how to do the vulnerability coordination as well.

                          • major builds are out as of this writing πŸ˜‚

                            No distros have official updates for CVE-2026-31431. Fedora 42 and newer have updates, but no official advisory or acknowledgement of CVE-2026-31431. So with them it's unclear if it's even intentional. Red Hat, Ubuntu, Amazon Linux, and Suse all have advisories as of now, but NO updates.

                          • disable the algif_aead module as a mitigation. πŸ˜‚

                            Bespoke distros like RHEL don't use a module, it's compiled into the kernel.

                          I can't figure out what the Xint Code angle is with this copyfail stuff. On one hand, yes, it is a true vulnerability that affects a LOT of Linux distros available. And they did submit the bug for fixing to the upstream kernel people.

                          BUT the CVE has only existed for a week. And NONE of the distros IN THEIR ADVISORY had updates available at the time that they pulled the trigger for publication of the shiny copy.fail website.

                          I struggle to think of how this even happens. In all my years of infosec, you're either on board with doing CVD (e.g. coordinating with the former CERT/CC) or you're not (dropping 0day). But this all fits bizarrely in the middle. The publication gives the guise that they did the right thing, (and please use our AI services). But at the same time, they clearly chose to release the vulnerability details and functional exploit before any distro had the ability to properly do anything about it.

                          Either these Xint Code (Theori) people have a hidden agenda or ulterior motive that we aren't aware of yet. Or they're just really bad at coordinated vulnerability disclosure. You pick.

                          squaloujenkins@fosstodon.orgS This user is from outside of this forum
                          squaloujenkins@fosstodon.orgS This user is from outside of this forum
                          squaloujenkins@fosstodon.org
                          wrote last edited by
                          #24

                          @wdormann sidenote : I personally tested against several Amazon Linux 2023 (aged a few months to 2 days), all of them are immune to this exploit.
                          (default 'recommended' image, no tweaks)

                          wdormann@infosec.exchangeW 1 Reply Last reply
                          0
                          • squaloujenkins@fosstodon.orgS squaloujenkins@fosstodon.org

                            @wdormann sidenote : I personally tested against several Amazon Linux 2023 (aged a few months to 2 days), all of them are immune to this exploit.
                            (default 'recommended' image, no tweaks)

                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchange
                            wrote last edited by
                            #25

                            @squalouJenkins
                            Hmm, that does not jive with what Amazon says

                            squaloujenkins@fosstodon.orgS 1 Reply Last reply
                            0
                            • wdormann@infosec.exchangeW wdormann@infosec.exchange

                              While this vulnerability seems to be discovered using AI ("Xint Code"), I have to assume that they also let the AI decide how to do the vulnerability coordination as well.

                              • major builds are out as of this writing πŸ˜‚

                                No distros have official updates for CVE-2026-31431. Fedora 42 and newer have updates, but no official advisory or acknowledgement of CVE-2026-31431. So with them it's unclear if it's even intentional. Red Hat, Ubuntu, Amazon Linux, and Suse all have advisories as of now, but NO updates.

                              • disable the algif_aead module as a mitigation. πŸ˜‚

                                Bespoke distros like RHEL don't use a module, it's compiled into the kernel.

                              I can't figure out what the Xint Code angle is with this copyfail stuff. On one hand, yes, it is a true vulnerability that affects a LOT of Linux distros available. And they did submit the bug for fixing to the upstream kernel people.

                              BUT the CVE has only existed for a week. And NONE of the distros IN THEIR ADVISORY had updates available at the time that they pulled the trigger for publication of the shiny copy.fail website.

                              I struggle to think of how this even happens. In all my years of infosec, you're either on board with doing CVD (e.g. coordinating with the former CERT/CC) or you're not (dropping 0day). But this all fits bizarrely in the middle. The publication gives the guise that they did the right thing, (and please use our AI services). But at the same time, they clearly chose to release the vulnerability details and functional exploit before any distro had the ability to properly do anything about it.

                              Either these Xint Code (Theori) people have a hidden agenda or ulterior motive that we aren't aware of yet. Or they're just really bad at coordinated vulnerability disclosure. You pick.

                              chaz6@ipv6.socialC This user is from outside of this forum
                              chaz6@ipv6.socialC This user is from outside of this forum
                              chaz6@ipv6.social
                              wrote last edited by
                              #26

                              @wdormann I'm running F43 and don't appear to be affected (in so far as I can't get the exploit to run). But yeah this is a bit πŸ’©

                              1 Reply Last reply
                              0
                              • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                While this vulnerability seems to be discovered using AI ("Xint Code"), I have to assume that they also let the AI decide how to do the vulnerability coordination as well.

                                • major builds are out as of this writing πŸ˜‚

                                  No distros have official updates for CVE-2026-31431. Fedora 42 and newer have updates, but no official advisory or acknowledgement of CVE-2026-31431. So with them it's unclear if it's even intentional. Red Hat, Ubuntu, Amazon Linux, and Suse all have advisories as of now, but NO updates.

                                • disable the algif_aead module as a mitigation. πŸ˜‚

                                  Bespoke distros like RHEL don't use a module, it's compiled into the kernel.

                                I can't figure out what the Xint Code angle is with this copyfail stuff. On one hand, yes, it is a true vulnerability that affects a LOT of Linux distros available. And they did submit the bug for fixing to the upstream kernel people.

                                BUT the CVE has only existed for a week. And NONE of the distros IN THEIR ADVISORY had updates available at the time that they pulled the trigger for publication of the shiny copy.fail website.

                                I struggle to think of how this even happens. In all my years of infosec, you're either on board with doing CVD (e.g. coordinating with the former CERT/CC) or you're not (dropping 0day). But this all fits bizarrely in the middle. The publication gives the guise that they did the right thing, (and please use our AI services). But at the same time, they clearly chose to release the vulnerability details and functional exploit before any distro had the ability to properly do anything about it.

                                Either these Xint Code (Theori) people have a hidden agenda or ulterior motive that we aren't aware of yet. Or they're just really bad at coordinated vulnerability disclosure. You pick.

                                jtig@infosec.exchangeJ This user is from outside of this forum
                                jtig@infosec.exchangeJ This user is from outside of this forum
                                jtig@infosec.exchange
                                wrote last edited by
                                #27

                                @wdormann thanks for this. I checked out from the website after I noticed the Claude Code sheen on the site and seeing discourse about the PoC.

                                Figured someone wanted to acclaim fame for chucking a few dollars in the token machine, and getting it 80% right. Now the actual smart people can figure out the rest.

                                1 Reply Last reply
                                0
                                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                  @CliffsEsport
                                  All of those are vulnerable except for Fedora, if it has updates installed.
                                  If you're the only user of these systems, then you have much less to worry about than multi-user systems.

                                  letoams@defcon.socialL This user is from outside of this forum
                                  letoams@defcon.socialL This user is from outside of this forum
                                  letoams@defcon.social
                                  wrote last edited by
                                  #28

                                  @wdormann @CliffsEsport fedora was vulnerable to me (maybe not if a kernel got released in the last few hours but otherwise yes it’s vulnerable )

                                  wdormann@infosec.exchangeW 1 Reply Last reply
                                  0
                                  • letoams@defcon.socialL letoams@defcon.social

                                    @wdormann @CliffsEsport fedora was vulnerable to me (maybe not if a kernel got released in the last few hours but otherwise yes it’s vulnerable )

                                    wdormann@infosec.exchangeW This user is from outside of this forum
                                    wdormann@infosec.exchangeW This user is from outside of this forum
                                    wdormann@infosec.exchange
                                    wrote last edited by
                                    #29

                                    @letoams @CliffsEsport
                                    Up-to-date Fedora (42 or later) are not affected at the time of publication (Yesterday).
                                    At least on this Fedora 42 system, the kernel was built on April 23 and in stable 2 days ago. Not a few hours ago.

                                    chillybot@infosec.exchangeC letoams@defcon.socialL 2 Replies Last reply
                                    0
                                    • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                      @squalouJenkins
                                      Hmm, that does not jive with what Amazon says

                                      squaloujenkins@fosstodon.orgS This user is from outside of this forum
                                      squaloujenkins@fosstodon.orgS This user is from outside of this forum
                                      squaloujenkins@fosstodon.org
                                      wrote last edited by
                                      #30

                                      @wdormann weird,
                                      I get the same result (error on .splice) on amzn out of the box as on my desktop after applying mitigation

                                      wdormann@infosec.exchangeW 1 Reply Last reply
                                      0
                                      • squaloujenkins@fosstodon.orgS squaloujenkins@fosstodon.org

                                        @wdormann weird,
                                        I get the same result (error on .splice) on amzn out of the box as on my desktop after applying mitigation

                                        wdormann@infosec.exchangeW This user is from outside of this forum
                                        wdormann@infosec.exchangeW This user is from outside of this forum
                                        wdormann@infosec.exchange
                                        wrote last edited by
                                        #31

                                        @squalouJenkins
                                        Oh, splice is a python error. Not that the platform isn't vulnerable.

                                        Interestingly, though, even with a new-enough python version, it still appears as not affected (prompt for password).

                                        Given that Amazon Linux 2023 is kernel 6.1.166 (package built on March 23), and the fix for CVE-2026-31431 didn't happen until 6.1.170.

                                        Perhaps something other than a true fix is interfering with the successful exploitation? πŸ€”

                                        Link Preview Image
                                        wdormann@infosec.exchangeW 1 Reply Last reply
                                        0
                                        • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                          @letoams @CliffsEsport
                                          Up-to-date Fedora (42 or later) are not affected at the time of publication (Yesterday).
                                          At least on this Fedora 42 system, the kernel was built on April 23 and in stable 2 days ago. Not a few hours ago.

                                          chillybot@infosec.exchangeC This user is from outside of this forum
                                          chillybot@infosec.exchangeC This user is from outside of this forum
                                          chillybot@infosec.exchange
                                          wrote last edited by
                                          #32

                                          @wdormann @letoams @CliffsEsport confirmed up to date Fedora 43 is also not vulnerable but not if installed kernel is before 6.18.22

                                          wdormann@infosec.exchangeW 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups