CopyFail: From Pod to Host

· security systems ai · Source ↗

TLDR

  • CVE-2026-31431 exploits a 4-byte Linux page cache write via AF_ALG/splice to escape Kubernetes containers and achieve host root.

Key Takeaways

  • Copy Fail abuses AF_ALG authencesn IPSec code to mutate page cache folios without triggering overlayfs copy-up, bypassing normal write accounting entirely.
  • Because container overlayfs lower layers share host inodes, any pod sharing a base layer hash (e.g. python:3.12-slim, debian:bookworm-slim) reads poisoned cache bytes.
  • Scenario 1: cross-container poisoning requires only pods/create rights; attacker schedules on victim node, inherits shared layer, poisons Python modules or glibc in co-located pods.
  • Scenario 2: container escape targets the runc read-only bind mount introduced post-CVE-2019-5736, overwriting runc’s cached pages to get host root shell.
  • On-disk bytes are unchanged; image-registry scanners, file-integrity monitors, and agentless disk scanners see no evidence of compromise.

Hacker News Comment Review

  • No substantive HN discussion yet.

Original | Discuss on HN