<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Exploit on cold-reboot</title><link>https://coldreboot.dev/tags/exploit/</link><description>Recent content in Exploit on cold-reboot</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 01 May 2026 00:00:00 +0900</lastBuildDate><atom:link href="https://coldreboot.dev/tags/exploit/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-31431 Copy Fail</title><link>https://coldreboot.dev/posts/cve-2026-31431/</link><pubDate>Fri, 01 May 2026 00:00:00 +0900</pubDate><guid>https://coldreboot.dev/posts/cve-2026-31431/</guid><description>&lt;blockquote&gt;
&lt;p&gt;A study-while-writing post on a juicy Linux kernel bug. Corrections welcome via &lt;a href="https://coldreboot.dev/about"&gt;email&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="tldr"&gt;TL;DR&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;CVE-2026-31431 (Copy Fail) is a logic bug in the Linux kernel&amp;rsquo;s &lt;code&gt;algif_aead&lt;/code&gt; (the AEAD interface of AF_ALG, the userspace kernel crypto API).&lt;/li&gt;
&lt;li&gt;An unprivileged local user can trigger a deterministic, controlled 4-byte write into the page cache of any readable file.&lt;/li&gt;
&lt;li&gt;Used against &lt;code&gt;/usr/bin/su&lt;/code&gt; or similar setuid binaries, this gives root.&lt;/li&gt;
&lt;li&gt;The bug was introduced by an &amp;ldquo;in-place optimization&amp;rdquo; commit in 2017 — it sat there for around 8 years.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id="1-introduction"&gt;1. Introduction&lt;/h2&gt;
&lt;p&gt;On April 29, 2026, the Korean offensive security firm Theori and their research team Xint Code disclosed a vulnerability they nicknamed &amp;ldquo;Copy Fail.&amp;rdquo;&lt;/p&gt;</description></item></channel></rss>