• A security bug in AEAD sockets

    From LWN.net@1337:1/100 to All on Thursday, April 30, 2026 01:15:05
    A security bug in AEAD sockets

    Date:
    Thu, 30 Apr 2026 00:01:05 +0000

    Description:
    Security analysis firm Xint has disclosed a security bug in the Linux kernel that allows for arbitrary 4-byte writes to the page cache, and which has been present since 2017.
    The vulnerability has been fixed in mainline kernels. A proof-of-concept script demonstrates how to use the flaw to corrupt a setuid
    binary, which works on
    multiple distributions, by requesting an AEAD-encrypted socket from user space and splicing a particular payload into it.
    A supplemental blog
    post gives more details about the discovery and remediation. A core primitive underlying this bug is splice(): it transfers data between file
    descriptors and pipes without copying, passing page cache pages by reference. When a user splices a file into a pipe and then into an AF_ALG socket, the socket's input scatterlist holds direct references to the kernel's cached pages
    of that file. The pages are not duplicated; the scatterlist entries point at the
    same physical pages that back every read() , mmap() , and execve() of that file.

    ======================================================================
    Link to news story:
    https://lwn.net/Articles/1070454/


    --- Mystic BBS v1.12 A49 (Linux/64)
    * Origin: tqwNet UK HUB @ hub.uk.erb.pw (1337:1/100)