<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Theori — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/theori/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 13:54:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/theori/feed.xml" rel="self" type="application/rss+xml"/><item><title>Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel</title><link>https://feed.craftedsignal.io/briefs/2026-04-copy-fail/</link><pubDate>Thu, 30 Apr 2026 13:54:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-copy-fail/</guid><description>A local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.</description><content:encoded><![CDATA[<p>A local privilege escalation vulnerability, &ldquo;Copy Fail&rdquo; (CVE-2026-31431), impacts Linux kernels released since 2017. Discovered by Theori&rsquo;s AI-driven pentesting platform Xint Code, the vulnerability allows an unprivileged local attacker to gain root permissions. Theori reported the finding to the Linux kernel security team on March 23, 2026, and patches became available within a week. A proof-of-concept exploit was published, demonstrating a 732-byte script that can root every Linux distribution shipped since 2017. This vulnerability stems from a logic bug in the Linux kernel&rsquo;s authencesn cryptographic template. Theori demonstrated successful exploits on Ubuntu 24.04, Amazon Linux 2023, RHEL 10.1, and SUSE 16.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged local attacker gains access to a vulnerable Linux system.</li>
<li>The attacker utilizes the <code>AF_ALG</code> socket-based interface to access Linux kernel crypto functions from user space.</li>
<li>The attacker uses the <code>splice()</code> system call to perform a controlled 4-byte write in the page cache of a readable file, instead of a normal buffer.</li>
<li>The attacker targets a setuid-root binary file for modification.</li>
<li>The 4-byte write alters the behavior of the setuid-root binary.</li>
<li>The attacker executes the modified setuid-root binary.</li>
<li>Due to the altered behavior, the binary grants the attacker elevated privileges.</li>
<li>The attacker gains root privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the Copy Fail vulnerability (CVE-2026-31431) allows an unprivileged local attacker to gain root privileges on a vulnerable Linux system. Theori demonstrated and confirmed the exploit on Ubuntu 24.04, Amazon Linux 2023, RHEL 10.1, and SUSE 16, highlighting the widespread impact. Multi-tenant Linux hosts, Kubernetes/container clusters, CI runners/build farms, and cloud SaaS environments running user code are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available kernel patches for CVE-2026-31431 on affected Linux distributions, prioritizing multi-tenant environments (e.g., Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, SUSE 16).</li>
<li>As an interim mitigation, disable the vulnerable crypto interface by blocking <code>AF_ALG</code> socket creation or disabling the <code>algif_aead</code> module, as described in the overview.</li>
<li>Monitor for the execution of unusual processes after the modification of binaries in <code>/tmp</code> or <code>/var/tmp</code> using the Sigma rule &ldquo;Detect Suspicious Splice Usage for Privilege Escalation&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Detect algif_aead module removal&rdquo; to detect attempts to disable the vulnerable module.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category></item></channel></rss>