Particle.news
Download on the App Store

Linux 'Copy Fail' Bug Lets Local Users Gain Root as Patches Roll Out

Public exploit code raises urgency for kernel updates on shared hosts running untrusted code.

Overview

  • Researchers disclosed Wednesday a 732‑byte Python proof of concept that turns any unprivileged account into root on most Linux releases built since 2017.
  • The flaw sits in the kernel’s authencesn crypto path and, via AF_ALG sockets and splice(), lets a user write four chosen bytes into a file’s page cache, so a setuid tool like /usr/bin/su runs modified code from memory while the disk file stays unchanged.
  • Because the page cache is shared across processes, the bug can break container isolation and let a low‑privilege pod or CI job take over a Kubernetes node or multi‑tenant server.
  • Upstream is fixed by mainline commit a664bf3d603d and vendors are issuing or deploying patched kernels, with temporary mitigations including disabling the algif_aead module or blocking AF_ALG socket creation with seccomp.
  • Xint/Theori found the bug using AI‑assisted code analysis, it carries a High CVSS 7.8 rating, and admins are urged to prioritize updates on multi‑user hosts, CI runners, and environments that execute third‑party code.