Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Holy. Fucking. Fuckballs.

Holy. Fucking. Fuckballs.

Scheduled Pinned Locked Moved Uncategorized
copyfaillinux
4 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • darkrat@chaosfurs.socialD This user is from outside of this forum
    darkrat@chaosfurs.socialD This user is from outside of this forum
    darkrat@chaosfurs.social
    wrote last edited by
    #1

    Holy. Fucking. Fuckballs.

    This exploit is... insane.

    > An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root

    Link Preview Image
    Copy Fail — 732 Bytes to Root

    Copy Fail (CVE-2026-31431): a 732-byte Linux LPE — straight-line, no race, no per-distro offsets. Same Python script roots Ubuntu, Amazon Linux, RHEL, SUSE since 2017. Page-cache write bypasses on-disk file-integrity tools and crosses container boundaries. Found by Xint Code.

    favicon

    Xint (copy.fail)

    #copyfail #linux

    thibaultmol@en.osm.townT 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • darkrat@chaosfurs.socialD darkrat@chaosfurs.social

      Holy. Fucking. Fuckballs.

      This exploit is... insane.

      > An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root

      Link Preview Image
      Copy Fail — 732 Bytes to Root

      Copy Fail (CVE-2026-31431): a 732-byte Linux LPE — straight-line, no race, no per-distro offsets. Same Python script roots Ubuntu, Amazon Linux, RHEL, SUSE since 2017. Page-cache write bypasses on-disk file-integrity tools and crosses container boundaries. Found by Xint Code.

      favicon

      Xint (copy.fail)

      #copyfail #linux

      thibaultmol@en.osm.townT This user is from outside of this forum
      thibaultmol@en.osm.townT This user is from outside of this forum
      thibaultmol@en.osm.town
      wrote last edited by
      #2

      @darkrat It's weird how the code they want you to curl and run is minified and has a binary section in it.... just weird....

      edit: tbc, my friend said this, I hadn't checked it yet.
      He said that this is not normally how proof of concepts are written

      I really hope someone on fedi who knows this stuff can verify this cause I'm not boosting it without seeing that

      drwho@masto.hackers.townD 1 Reply Last reply
      0
      • thibaultmol@en.osm.townT thibaultmol@en.osm.town

        @darkrat It's weird how the code they want you to curl and run is minified and has a binary section in it.... just weird....

        edit: tbc, my friend said this, I hadn't checked it yet.
        He said that this is not normally how proof of concepts are written

        I really hope someone on fedi who knows this stuff can verify this cause I'm not boosting it without seeing that

        drwho@masto.hackers.townD This user is from outside of this forum
        drwho@masto.hackers.townD This user is from outside of this forum
        drwho@masto.hackers.town
        wrote last edited by
        #3

        @thibaultmol @darkrat It's needlessly obfuscated. And the "curl pipe bash" construction is just bullshit.

        That said, a few of us tested it and it didn't work on our boxen.

        privateger@plasmatrap.comP 1 Reply Last reply
        0
        • drwho@masto.hackers.townD drwho@masto.hackers.town

          @thibaultmol @darkrat It's needlessly obfuscated. And the "curl pipe bash" construction is just bullshit.

          That said, a few of us tested it and it didn't work on our boxen.

          privateger@plasmatrap.comP This user is from outside of this forum
          privateger@plasmatrap.comP This user is from outside of this forum
          privateger@plasmatrap.com
          wrote last edited by
          #4

          @drwho@masto.hackers.town @thibaultmol@en.osm.town @darkrat@chaosfurs.social
          It is minified but really not difficult to pull apart.
          It opens /usr/bin/su, then repeatedly calls c(f, i, e[i:i+4]) to write the embedded payload into the cached image of /usr/bin/su in 4-byte chunks.

          The write-up describes this. The sendmsg() data carries the 4 controlled bytes, splice() supplies the page-cache-backed file pages, and recv() triggers the authencesn path that writes those bytes into the cached file page.
          After patching the cached copy, it just runs su. That's it.

          s.socket(38,5,0) are the numeric constants for AF_ALG and SOCK_SEQPACKET, it's equivalent to
          socket.socket(socket.AF_ALG, socket.SOCK_SEQPACKET, 0).

          The zlib blob decompresses to a 160-byte ELF executable, it basically only contains:

          setuid(0)
          execve("/bin/sh", NULL, NULL)
          exit(0)
          to pop a root shell.

          The CVE is real; I got it to work just fine on my Proxmox host (Linux 6.17.13-2)

          1 Reply Last reply
          1
          0
          • R relay@relay.mycrowd.ca shared this topic
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups