su(スー)を書き換えてルート昇格できるやばいLinux脆弱性「copy-fail」見つかる

1 : 2026/05/01(金) 15:39:01.11 ID:HQR3Asa40

https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html?m=1

New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions
Ravie LakshmananApr 30, 2026

レス1番のリンク先のサムネイル画像
2 : 2026/05/01(金) 15:39:34.65 ID:3TeVGNPX0
ビビアン(*´∀`)
16 : 2026/05/01(金) 15:46:20.60 ID:ZR9vqkfv0
>>2
こないだスペンドラのこと教えてもらった者だけど、さっき届いたよ!
明後日ソープ行くから使ってみるね!
ありがとう!
25 : 2026/05/01(金) 16:22:58.39 ID:3TeVGNPX0
>>16
幸運を祈る!!
俺のは未だ届かない(´;ω;`)
28 : 2026/05/01(金) 16:34:25.61 ID:ZR9vqkfv0
>>25
あら…
とにかくありがとう!
行ったらまた使用感とか報告するね!
3 : 2026/05/01(金) 15:39:48.00 ID:HQR3Asa40
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.

The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori.

“An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root,” the vulnerability research team at Xint.io and Theori said.

At its core, the vulnerability stems from a logic flaw in the Linux kernel’s cryptographic subsystem, specifically within the algif_aead module. The issue was introduced in a source code commit made in August 2017.

Successful exploitation of the shortcoming could allow a simple 732-byte Python script to edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017, including Amazon Linux, RHEL, SUSE, and Ubuntu. The Python exploit involves four steps –

Open an AF_ALG socket and bind to authencesn(hmac(sha256),cbc(aes))
Construct the shellcode payload
Trigger the write operation to the kernel’s cached copy of “/usr/bin/su”
Call execve(“/usr/bin/su”) to load the injected shellcode and run it as root

While the vulnerability is not remotely exploitable in isolation, a local unprivileged user can get root simply by corrupting the page cache of a setuid binary. The same primitive also has cross-container impacts as the page cache is shared across all processes on a system.

In response to the disclosure, Linux distributions have released their own advisories –

Amazon Linux
Arch Linux
CloudLinux
Debian
Gentoo
Red Hat Enterprise Linux
SUSE
Ubuntu

Copy Fail has its echoes in Dirty Pipe (CVE-2022-0847), another Linux kernel LPE vulnerability that could permit unprivileged users to splice data into the page cache of read-only files and ultimately overwrite sensitive files on the system to achieve code execution.

“Copy Fail is the same class of primitive, in a different subsystem,” Bugcrowd’s David Brumley said. “The 2017 in-place optimization in algif_aead allows a page-cache page to end up in the kernel’s writable destination scatterlist for an AEAD operation submitted over an AF_ALG socket. An unprivileged process can then drive splice() into that socket and complete a small, targeted write into the page cache of a file it doesn’t own.”

What makes the vulnerability dangerous is that it can be reliably triggered and does not require any race condition or kernel offset. On top of that, the same exploit works across distributions.

“This vulnerability is unique because it has four properties that almost never appear together: it’s portable, tiny, stealthy, and cross-container,” a Xint.io spokesperson told The Hacker News in a statement. “It allows any user account, no matter how low-level, to increase their privilege to full admin access. It also allows them to bypass sandboxing and works across all Linux versions and distributions.”

4 : 2026/05/01(金) 15:39:56.18 ID:HQR3Asa40
どうすんのこれ
5 : 2026/05/01(金) 15:40:02.92 ID:B5RR2dzR0
suを差し上げます
6 : 2026/05/01(金) 15:40:03.89 ID:HQR3Asa40
晋さん…
8 : 2026/05/01(金) 15:42:16.40 ID:DjCF5bRI0
須藤さんは?
9 : 2026/05/01(金) 15:42:48.78 ID:V+ZGpGzr0
またAIがやってしまったの?
11 : 2026/05/01(金) 15:44:26.29 ID:s+YupegA0
これAIに聞いたけどさっぱりわからんかった
教えてハッカーモメン
なんかコンテナでも危ないって言われるんだけど
19 : 2026/05/01(金) 15:49:38.78 ID:DyYPheUh0
>>11
AIってこういうとこで人間より劣るよなあ
ハッカーのほうが優秀
21 : 2026/05/01(金) 15:51:20.57 ID:HQR3Asa40
>>11
俺もあまり詳しくないけど、Linuxカーネルの暗号化モジュールにバグがあって、本当は書き換えてはいけないメモリ内領域を暗号化に使うバッファーに指定できるんだと
で、メモリに読み出されてるsuをそのバッファーに指定すると、4バイトだけ書き換えることができるらしい
12 : 2026/05/01(金) 15:44:43.75 ID:1wBgXSow0
須藤コマンド
13 : 2026/05/01(金) 15:46:02.37 ID:nSoAs2vB0
インターネット経由でsshログインできる環境でもない限り直ちに影響ないから
14 : 2026/05/01(金) 15:46:02.57 ID:ciA1TiMra
sudoって誰だよ
15 : 2026/05/01(金) 15:46:02.64 ID:TXA/4Eme0
脆弱性の具体的な内容はともかくとして、たった30文字程度でルート取れる脆弱性として動画では人気コンテンツだな
18 : 2026/05/01(金) 15:48:22.93 ID:gYTRwNN50
ゆいちゃんまじゆいちゃん
20 : 2026/05/01(金) 15:50:33.94 ID:yEBbtg2S0
須藤さんの立場は?
22 : 2026/05/01(金) 15:53:24.39 ID:EZ1lQ84iM
自宅にVPNサーバー立てようと思ったけどクッソ怖い
23 : 2026/05/01(金) 16:03:04.09 ID:vT9Vp//f0
rootの存在自体が悪の気がするけど対策思いつかないし不便になる
27 : 2026/05/01(金) 16:32:38.89 ID:RB+sRxOq0
既にほかの方法で侵入されてリモートコード実行可能な状態になった場合にこの方法で昇格できる、というだけかな
CVSS7.8だから重要扱いだけどクリティカルではない
29 : 2026/05/01(金) 16:35:18.74 ID:LqTCb//B0
スーを差し上げます
だろ?
32 : 2026/05/01(金) 16:42:50.62 ID:kRkelIzhM
(´·ω·`)CUIいまだに現役か、まあGUIだとしても実質ラッパー被せてるだけかもしれんが

コメント

タイトルとURLをコピーしました