Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <177abb5d-8ba9-4bb9-8b23-9fbc868ed3cd@gmail.com>
Date: Fri, 1 May 2026 11:30:17 -0400
From: Demi Marie Obenour <demiobenour@...il.com>
To: oss-security@...ts.openwall.com, Eric Biggers <ebiggers@...nel.org>
Cc: Jan Schaumann <jschauma@...meister.org>
Subject: Re: CVE-2026-31431: CopyFail: linux local privilege
 scalation

On 4/30/26 03:19, Eric Biggers wrote:
> On Thu, Apr 30, 2026 at 09:01:22AM +0200, Salvatore Bonaccorso wrote:
>> Hi,
>>
>> On Thu, Apr 30, 2026 at 05:52:37AM +0100, Sam James wrote:
>>> Eddie Chapman <eddie@...k.net> writes:
>>>
>>>> On 29/04/2026 21:23, Jan Schaumann wrote:
>>>>> Affected and fixed versions
>>>>> ===========================
>>>>> Issue introduced in 4.14 with commit
>>>>> 72548b093ee38a6d4f2a19e6ef1948ae05c181f7 and fixed in
>>>>> 6.18.22 with commit
>>>>> fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8
>>>>> Issue introduced in 4.14 with commit
>>>>> 72548b093ee38a6d4f2a19e6ef1948ae05c181f7 and fixed in
>>>>> 6.19.12 with commit
>>>>> ce42ee423e58dffa5ec03524054c9d8bfd4f6237
>>>>> Issue introduced in 4.14 with commit
>>>>> 72548b093ee38a6d4f2a19e6ef1948ae05c181f7 and fixed in
>>>>> 7.0 with commit
>>>>> a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5
>>>>> https://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8
>>>>> https://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237
>>>>> https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5
>>>>
>>>> So this is one of the worst make-me-root vulnerabilities in the kernel
>>>> in recent times. I see that on the 11th of April 6.19.12 & 6.18.22
>>>> were released with the fix backported.
>>>>
>>>> Longterm 6.12, 6.6, 6.1, 5.15, 5.10 have not received the fix and I
>>>> don't see anything in the upstream stable queues yet as I write. My
>>>> guess is backporting that far back is not as straightforward. As this
>>>> was introduced in 2017 all those older kernels are affected, right? Or
>>>> am I missing something?
>>>
>>> It does not apply cleanly, no. Attached is the workaround we're going to
>>> use. I'm not an expert on IPSec but I think this is the lesser evil.
>>>
>>> I attempted a backport but ran into a few API changes and wasn't
>>> confident enough to muck around with it, especially for something to
>>> deploy immediately.
>>
>> Backports have just been posted, for 6.12.y:
>> https://lore.kernel.org/stable/2026043038-unwilling-slogan-a20e@gregkh/T/#t
>>
>> (but I do not see them yet for all versions, but guess following soon)
> 
> Yes, no one else was doing it, so I posted backports:
> 
> 6.12 and 6.6: https://lore.kernel.org/stable/20260430060702.110091-1-ebiggers@kernel.org/
> 6.1: https://lore.kernel.org/stable/20260430062731.140497-1-ebiggers@kernel.org/
> 5.15: https://lore.kernel.org/stable/20260430063604.173525-1-ebiggers@kernel.org/
> 5.10: https://lore.kernel.org/stable/20260430070128.219863-1-ebiggers@kernel.org/
> 
> But I also hope this finally provides some more impetus for AF_ALG to be
> deprecated and removed.  It's a massive, largely pointless attack
> surface which has been causing problems, including regular CVEs, ever
> since it was added to the kernel in 2010.  And of course it's gotten
> even worse lately, with LLMs now being able to find the bugs.
> 
> Userspace crypto libraries exist.  There's no need to escalate to kernel
> mode just to do some math.

The only reason I can think of to keep it is for embedded systems
with weak CPUs and crypto accelerators that are actually worth using.
However, those seem to be very rare outside of things like routers,
which run specialized distros like OpenWRT.  Even when the accelerator
exists and is worth using, AF_ALG is certainly not an efficient way
to access it.

Furthermore, an inline encryption engine in the NIC would be a much
better choice for future router designs.  AF_ALG doesn't work with
that at all.
> On Linux systems with no programs that use AF_ALG, it can already be
> disabled in the kconfig by unsetting CONFIG_CRYPTO_USER_API_*.
> 
> But there are some holdouts like iwd (iNet wireless daemon) that are
> keeping general-purpose Linux distros from being able to disable it.

If AF_ALG was removed from the kernel, that would provide an incentive
for someone to patch iwd to use a userspace library instead.  Or if
iwd is unmaintained, it (sadly) needs to be removed from distros.
(Sadly because wpa-supplicant is much less well designed.)

> It may also be time for a sysctl that allows restricting it to root, or
> only to certain algorithms, etc.  There is zero reason for "authencesn"
> (which the exploit uses) to be accessible, for example.
Indeed so.  And don't autoload the module.
-- 
Sincerely,
Demi Marie Obenour (she/her/hers)
Download attachment "OpenPGP_0xB288B55FFF9C22C1.asc" of type "application/pgp-keys" (7141 bytes)

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.