{"id":38942,"date":"2026-04-30T17:36:31","date_gmt":"2026-04-30T09:36:31","guid":{"rendered":"https:\/\/www.deepin.org\/?p=38942"},"modified":"2026-04-30T18:21:27","modified_gmt":"2026-04-30T10:21:27","slug":"linux-kernel-copy-fail-vulnerability-fix","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/linux-kernel-copy-fail-vulnerability-fix\/","title":{"rendered":"Urgent Security Update | Fix for Linux Kernel Copy Fail Local Privilege Escalation Vulnerability \u2013 Upgrade Immediately!"},"content":{"rendered":"<img loading=\"lazy\" class=\"alignnone size-full wp-image-38946\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c.png\" alt=\"\" width=\"900\" height=\"383\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c.png 900w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c-300x128.png 300w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c-150x64.png 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c-768x327.png 768w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c-24x10.png 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c-36x15.png 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2026\/04\/\u516c\u4f17\u53f7\u7cfb\u5217-10\u526f\u672c_\u526f\u672c-48x20.png 48w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>Dear deepin users and community partners,<\/p>\n<p>Recently, the deepin community detected a high-risk local privilege escalation vulnerability in the Linux kernel.<\/p>\n<p>This vulnerability, dubbed \"Copy Fail\" (CVE-2026-31431), exists in the Linux kernel cryptographic subsystem (the\u00a0<code>algif_aead<\/code> module). It originates from a code optimization introduced in 2017, which causes the AF_ALG cryptographic interface to potentially share the same kernel page cache page between the source and destination buffers when processing AEAD cryptographic operations.<\/p>\n<p>Given its severity and widespread impact, we strongly recommend that all users upgrade as soon as possible to ensure the security of your systems.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>I. Vulnerability Information<\/strong><\/h2>\n<p><strong>CVE ID:<\/strong> CVE-2026-31431<\/p>\n<p><strong>Description:<\/strong>\u00a0This vulnerability stems from a logical flaw in the\u00a0<code>algif_aead<\/code>\u00a0module of the Linux kernel cryptographic subsystem. A 2017 optimization introduced in-place operations, leading to inconsistent memory mappings for source and destination during associated data (AD) processing. As a result, kernel page cache pages can be mixed into a writable scatterlist. By combining the AF_ALG cryptographic interface with the\u00a0<code>splice()<\/code>\u00a0system call, an attacker can write 4 bytes of controlled data into the page cache of any readable file (e.g., the setuid program\u00a0<code>\/usr\/bin\/su<\/code>). Since the page cache is shared by all processes on the same kernel, tampering with a setuid program and subsequently executing it can grant root privileges.<\/p>\n<p><strong>Severity:<\/strong> High<\/p>\n<p><strong>Exploitation Prerequisites:<\/strong> An attacker only needs local unprivileged user access to launch the attack.<\/p>\n<p><strong>Affected Scope:<\/strong>\u00a0All users running an unpatched deepin 25 are affected. Immediate update and upgrade are recommended.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>II. Fix Progress<\/strong><\/h2>\n<ul>\n<li><strong>deepin 25 (6.18 kernel):<\/strong>\u00a0The security update has been pushed \u2013 please upgrade immediately!<\/li>\n<li><strong>deepin 25 (6.6 kernel):<\/strong>\u00a0The fix has been completed. Please stay tuned for the upcoming system update.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Dear deepin users and community partners, Recently, the deepin community detected a high-risk local privilege escalation vulnerability in the Linux kernel. This vulnerability, dubbed \"Copy Fail\" (CVE-2026-31431), exists in the Linux kernel cryptographic subsystem (the\u00a0algif_aead module). It originates from a code optimization introduced in 2017, which causes the AF_ALG cryptographic interface to potentially share the same kernel page cache page between the source and destination buffers when processing AEAD cryptographic operations. Given its severity and widespread impact, we strongly recommend that all users upgrade as soon as possible to ensure the security of your systems. &nbsp; I. Vulnerability Information CVE ...<a href=https:\/\/www.deepin.org.cn\/en\/linux-kernel-copy-fail-vulnerability-fix\/>Read more<\/a><\/p>\n","protected":false},"author":18825,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[75,93],"tags":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/38942"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/18825"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=38942"}],"version-history":[{"count":3,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/38942\/revisions"}],"predecessor-version":[{"id":38949,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/38942\/revisions\/38949"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=38942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=38942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=38942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}