<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kernel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/kernel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 03:06:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/kernel/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</link><pubDate>Sat, 02 May 2026 03:06:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</guid><description>The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.</description><content:encoded><![CDATA[<p>CVE-2026-31431, known as &ldquo;Copy Fail,&rdquo; is a high-severity local privilege escalation vulnerability affecting the Linux kernel&rsquo;s cryptographic subsystem. The vulnerability resides within the algif_aead module of the AF_ALG (userspace crypto API) and results from improper memory handling during in-place operations. An unprivileged user can exploit this flaw to corrupt the cache of readable files, including setuid binaries, resulting in unauthorized root privilege escalation. This vulnerability impacts a wide range of Linux distributions, including Ubuntu 24.04 LTS, Amazon Linux 2023, Red Hat Enterprise Linux (RHEL 10.1), and SUSE 16, as well as other distributions like Debian, Fedora, and Arch Linux. The availability of a working proof-of-concept exploit has raised concerns about potential widespread exploitation, leading to its addition to the CISA KEV catalog.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> The attacker gains limited visibility into the environment (e.g., compromised CI runner, web container) and identifies the kernel version. Kernel version information is obtained without elevated privileges.</li>
<li><strong>Script Execution:</strong> The attacker executes a compact Python script that interacts with standard kernel interfaces, without relying on networking, compilation, or third-party libraries.</li>
<li><strong>AF_ALG Abuse:</strong> The script abuses an interaction between the AF_ALG (asynchronous crypto) socket interface, the splice() system call and improper error handling during a failed copy operation.</li>
<li><strong>Kernel Page Cache Corruption:</strong> This interaction leads to a controlled 4-byte overwrite in the kernel page cache, corrupting sensitive kernel-managed data.</li>
<li><strong>Privilege Escalation:</strong> By corrupting kernel structures associated with credentials or execution context, the attacker escalates their process to UID 0.</li>
<li><strong>Boundary Breach:</strong> The system&rsquo;s privilege boundary is broken, neutralizing SELinux/AppArmor protections, and bypassing local security controls.</li>
<li><strong>Lateral Movement/Container Escape:</strong> The attacker can now use the root privileges gained to perform lateral movement or escape the container.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to full root privilege escalation, resulting in high impact to confidentiality, integrity, and availability. This could facilitate container breakout, multi-tenant compromise, and lateral movement within shared environments. The vulnerability&rsquo;s reliability, stealth (in-memory-only modification), and cross-platform applicability make it particularly dangerous in cloud, CI/CD, and Kubernetes environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all instances of affected products and versions in your environment and prioritize patching (CVE-2026-31431).</li>
<li>Deploy the Sigma rule for suspicious process execution under /tmp, often used in exploit PoCs, and tune for your environment.</li>
<li>Monitor for suspicious AF_ALG socket creation events, as indicated in the Attack Chain, using the provided Sigma rule.</li>
<li>If patches are unavailable, consider implementing network isolation and access controls as interim mitigation measures.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>kernel</category></item><item><title>Multiple Vulnerabilities in Red Hat Linux Kernel</title><link>https://feed.craftedsignal.io/briefs/2026-04-redhat-kernel-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-redhat-kernel-vulns/</guid><description>Multiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.</description><content:encoded><![CDATA[<p>On April 30, 2026, CERT-FR published an advisory regarding multiple vulnerabilities in the Red Hat Linux kernel. These vulnerabilities, detailed in Red Hat Security Advisories RHSA-2026:10756, RHSA-2026:10996, and RHSA-2026:11313, can lead to significant security risks including arbitrary code execution, privilege escalation, and remote denial of service. The affected systems include various versions and architectures of Red Hat CodeReady Linux Builder and Red Hat Enterprise Linux. Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized access, control systems, or disrupt services, impacting the confidentiality, integrity, and availability of affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise (via unconfirmed vector):</strong> An attacker identifies a vulnerable Red Hat Linux system running an affected kernel version. While the exact exploit vector isn&rsquo;t specified in the advisory, it involves a vulnerability in the kernel.</li>
<li><strong>Exploit Trigger:</strong> The attacker triggers a specific kernel vulnerability, such as those identified as CVE-2026-23001 or CVE-2026-31402, by sending a crafted input to a vulnerable kernel component. The specific method depends on the nature of each CVE.</li>
<li><strong>Code Execution:</strong> Upon successful exploitation, the attacker achieves arbitrary code execution within the kernel context. This allows the attacker to run malicious code directly on the system.</li>
<li><strong>Privilege Escalation:</strong> Leveraging the code execution capability, the attacker exploits another vulnerability (e.g., CVE-2025-68741) to escalate privileges to root or SYSTEM. This may involve exploiting race conditions, memory corruption bugs, or other privilege escalation flaws within the kernel.</li>
<li><strong>System Control:</strong> With elevated privileges, the attacker gains full control over the compromised system. They can now access sensitive data, modify system configurations, install backdoors, or move laterally to other systems within the network.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker uses the compromised system as a launching point to attack other systems on the network, potentially exploiting other vulnerabilities or using stolen credentials.</li>
<li><strong>Persistence (Optional):</strong> The attacker establishes persistence on the compromised system to maintain access even after reboots. This may involve installing rootkits, modifying system startup scripts, or creating rogue user accounts.</li>
<li><strong>Denial of Service/Data Exfiltration/etc.:</strong> Depending on their objectives, the attacker may use the compromised system to launch denial-of-service attacks against other targets, exfiltrate sensitive data, or cause other damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these kernel vulnerabilities can lead to complete system compromise, allowing attackers to execute arbitrary code, escalate privileges, and cause denial of service. The wide range of affected Red Hat Enterprise Linux and CodeReady Linux Builder versions implies a potentially large number of vulnerable systems. This can result in significant data breaches, system downtime, financial losses, and reputational damage for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches provided in Red Hat Security Advisories RHSA-2026:10756, RHSA-2026:10996, and RHSA-2026:11313 to remediate the vulnerabilities.</li>
<li>Prioritize patching systems based on their criticality and exposure to external networks.</li>
<li>Monitor systems for suspicious activity that may indicate exploitation attempts, focusing on unexpected kernel module loads or privilege escalations using process_creation logging.</li>
<li>Deploy the Sigma rule detecting suspicious kernel module loading to identify potential rootkit installation attempts.</li>
<li>Investigate any alerts generated by the deployed Sigma rules to determine the scope and impact of potential compromises.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>kernel</category><category>redhat</category><category>execution</category><category>privilege-escalation</category><category>denial-of-service</category></item><item><title>CVE-2026-26179 Windows Kernel Double Free Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-26179-privesc/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-26179-privesc/</guid><description>CVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.</description><content:encoded><![CDATA[<p>CVE-2026-26179 is a critical security vulnerability residing within the Windows Kernel. This double-free vulnerability allows an attacker with local access to elevate their privileges. Successful exploitation grants the attacker higher-level permissions on the compromised system. The vulnerability was reported to Microsoft and assigned a CVSS v3.1 score of 7.8, indicating a high severity. The vulnerability lies within the core operating system components, making it a significant threat to Windows-based environments. Exploitation of this vulnerability requires an attacker to have valid local credentials on the target system. The vulnerability was published on 2026-04-14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial local access to a Windows system through legitimate credentials or by exploiting another vulnerability.</li>
<li>The attacker crafts a malicious program designed to trigger the double-free condition in the Windows Kernel.</li>
<li>The malicious program interacts with a vulnerable kernel function, likely through a specific system call (Nt*).</li>
<li>The vulnerable kernel function attempts to free the same memory region twice due to a logical error.</li>
<li>The double-free corrupts the kernel&rsquo;s memory management structures, such as the heap metadata.</li>
<li>The memory corruption allows the attacker to overwrite critical kernel data structures, such as process tokens or privilege attributes.</li>
<li>The attacker modifies the process token of their own process, elevating their privileges to SYSTEM or another highly privileged account.</li>
<li>The attacker now executes privileged commands and gains full control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26179 allows a local attacker to elevate privileges to SYSTEM, the highest level of privilege on a Windows system. This grants the attacker complete control over the compromised machine, allowing them to install software, modify data, create new accounts, and access sensitive information. A successful privilege escalation can lead to a complete compromise of the confidentiality, integrity, and availability of the system. This vulnerability affects all Windows systems where the patch has not been applied.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-26179 as soon as possible.</li>
<li>Monitor systems for unusual process creation events originating from user accounts, as this could be an indicator of exploit activity. Deploy the provided Sigma rule <code>Detect Suspicious Process Token Modifications</code> to identify potential privilege escalation attempts.</li>
<li>Enable process auditing and monitor for unusual system calls using tools like Sysmon to catch the initial exploitation attempts.</li>
<li>Regularly review and enforce the principle of least privilege to limit the impact of successful local exploits.</li>
<li>Deploy the Sigma rule <code>Detect Double Free Vulnerability Exploitation</code> to identify exploitation of double free vulnerabilities by monitoring process creation and memory allocation patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category><category>kernel</category><category>double-free</category></item><item><title>Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs</title><link>https://feed.craftedsignal.io/briefs/2026-03-out-of-cancel/</link><pubDate>Wed, 25 Mar 2026 07:30:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-out-of-cancel/</guid><description>The 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.</description><content:encoded><![CDATA[<p>The &lsquo;Out-of-Cancel&rsquo; vulnerability class, discovered and detailed in March 2026, highlights a category of security flaws residing within the workqueue cancellation APIs in the Linux kernel. This vulnerability arises when work items are improperly handled during cancellation, potentially leading to use-after-free conditions, race conditions, and other memory corruption issues. The initial report and analysis were published on March 23, 2026. While specific exploits are not detailed in the source material, the nature of kernel vulnerabilities makes them critical for defenders to address. The impact can range from denial of service to privilege escalation and potentially arbitrary code execution within the kernel context. This vulnerability class affects a broad range of Linux systems, making it a widespread concern.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user-space program triggers a specific kernel function that queues a work item to a workqueue.</li>
<li>The work item is scheduled for execution, but before it begins, the user-space program requests cancellation of the work item via a workqueue cancellation API.</li>
<li>Due to a race condition or improper synchronization, the work item is canceled but not fully removed from the workqueue&rsquo;s internal data structures.</li>
<li>The kernel attempts to access the work item after it has been freed, resulting in a use-after-free vulnerability.</li>
<li>An attacker manipulates memory layout to place controlled data at the memory location of the freed work item.</li>
<li>The kernel code now operates on the attacker-controlled data, leading to memory corruption or information leakage.</li>
<li>The attacker leverages the memory corruption to overwrite critical kernel data structures, such as function pointers or security credentials.</li>
<li>Successful exploitation leads to privilege escalation, allowing the attacker to execute arbitrary code with kernel-level privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The &lsquo;Out-of-Cancel&rsquo; vulnerability class can lead to severe consequences, including kernel crashes (denial of service), privilege escalation, and potentially arbitrary code execution within the kernel. A successful exploit could allow an attacker to gain complete control over the affected system. Due to the ubiquitous nature of the Linux kernel, a wide range of systems are potentially vulnerable, impacting servers, desktops, embedded systems, and mobile devices. While the exact number of vulnerable systems is unknown, the widespread use of affected kernel versions implies a significant potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor kernel logs for errors related to workqueue cancellations to detect potential exploitation attempts. Enable auditd to log kernel function calls related to workqueue management (audit.rules).</li>
<li>Deploy the Sigma rule <code>Detect Potential Use-After-Free in Workqueue Cancellation</code> to identify suspicious kernel events related to workqueue operations.</li>
<li>Investigate any reported kernel panics or crashes, focusing on stack traces that involve workqueue-related functions.</li>
<li>Stay informed about kernel patches and security advisories related to workqueue vulnerabilities and apply them promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>linux</category><category>kernel</category><category>vulnerability</category><category>workqueue</category></item></channel></rss>