<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[If the exploit code can&#x27;t open su or other setuid binaries for reading, it can&#x27;t mess with their page cache.]]></title><description><![CDATA[<p>If the exploit code can't open <code>su</code> or other setuid binaries for reading, it can't mess with their page cache. So what about…</p><pre><code># find / -type f -uid 0 -perm /u=s | xargs -t -r chmod u-rw,g-rw,o-rw<br /></code></pre><p>? The binaries can then still be used for their desired privilege escalation features.</p>]]></description><link>https://board.circlewithadot.net/topic/1fec208f-ec6b-42da-889e-97c52a0caed5/if-the-exploit-code-can-t-open-su-or-other-setuid-binaries-for-reading-it-can-t-mess-with-their-page-cache.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 01 May 2026 01:03:37 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/1fec208f-ec6b-42da-889e-97c52a0caed5.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 30 Apr 2026 10:34:43 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to If the exploit code can&#x27;t open su or other setuid binaries for reading, it can&#x27;t mess with their page cache. on Thu, 30 Apr 2026 12:51:11 GMT]]></title><description><![CDATA[<p><span><a href="/user/vincent%40knuddelweide.de" rel="nofollow noopener">@<span>vincent</span></a></span> Correct.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116493744330765316</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116493744330765316</guid><dc:creator><![CDATA[hillu@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 12:51:11 GMT</pubDate></item><item><title><![CDATA[Reply to If the exploit code can&#x27;t open su or other setuid binaries for reading, it can&#x27;t mess with their page cache. on Thu, 30 Apr 2026 12:25:59 GMT]]></title><description><![CDATA[<p><a href="/user/hillu%40infosec.exchange">@hillu@infosec.exchange</a> It is my understanding that this will not work. There is a published exploit (<a href="https://github.com/rootsecdev/cve_2026_31431/blob/main/exploit_cve_2026_31431.py">https://github.com/rootsecdev/cve_2026_31431/blob/main/exploit_cve_2026_31431.py</a>) that messes with the page cache for /etc/passwd to simply show your user id as 0, so a normal call to <code>su</code> will make you root.</p>]]></description><link>https://board.circlewithadot.net/post/https://knuddelweide.de/notes/alp0uqykhhen0002</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://knuddelweide.de/notes/alp0uqykhhen0002</guid><dc:creator><![CDATA[vincent@knuddelweide.de]]></dc:creator><pubDate>Thu, 30 Apr 2026 12:25:59 GMT</pubDate></item><item><title><![CDATA[Reply to If the exploit code can&#x27;t open su or other setuid binaries for reading, it can&#x27;t mess with their page cache. on Thu, 30 Apr 2026 10:57:36 GMT]]></title><description><![CDATA[<p><span><a href="/user/hillu%40infosec.exchange">@<span>hillu</span></a></span> sorry <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f643.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--upside_down_face" style="height:23px;width:auto;vertical-align:middle" title="🙃" alt="🙃" /></p>]]></description><link>https://board.circlewithadot.net/post/https://social.troll.academy/users/clonejo/statuses/116493297711039042</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.troll.academy/users/clonejo/statuses/116493297711039042</guid><dc:creator><![CDATA[clonejo@social.troll.academy]]></dc:creator><pubDate>Thu, 30 Apr 2026 10:57:36 GMT</pubDate></item><item><title><![CDATA[Reply to If the exploit code can&#x27;t open su or other setuid binaries for reading, it can&#x27;t mess with their page cache. on Thu, 30 Apr 2026 10:55:57 GMT]]></title><description><![CDATA[<p><span><a href="https://social.troll.academy/@clonejo" rel="nofollow noopener">@<span>clonejo</span></a></span> Of course; thanks for helping me think. <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f609.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--wink" style="height:23px;width:auto;vertical-align:middle" title=";-)" alt="😉" /> In any case, it would still help against script kiddies, I guess.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116493291213265249</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116493291213265249</guid><dc:creator><![CDATA[hillu@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 10:55:57 GMT</pubDate></item><item><title><![CDATA[Reply to If the exploit code can&#x27;t open su or other setuid binaries for reading, it can&#x27;t mess with their page cache. on Thu, 30 Apr 2026 10:48:05 GMT]]></title><description><![CDATA[<p><span><a href="/user/hillu%40infosec.exchange">@<span>hillu</span></a></span> or just edit binaries that get executed by root</p>]]></description><link>https://board.circlewithadot.net/post/https://social.troll.academy/users/clonejo/statuses/116493260254756479</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.troll.academy/users/clonejo/statuses/116493260254756479</guid><dc:creator><![CDATA[clonejo@social.troll.academy]]></dc:creator><pubDate>Thu, 30 Apr 2026 10:48:05 GMT</pubDate></item><item><title><![CDATA[Reply to If the exploit code can&#x27;t open su or other setuid binaries for reading, it can&#x27;t mess with their page cache. on Thu, 30 Apr 2026 10:46:35 GMT]]></title><description><![CDATA[<p><span><a href="/user/hillu%40infosec.exchange">@<span>hillu</span></a></span> afaiu you can also manipulate other files than just those with setuid. For example cron jobs, systemd services that get executed as root.</p><p>Better deconfigure that exploitable code in the kernel.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.troll.academy/users/clonejo/statuses/116493254329241595</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.troll.academy/users/clonejo/statuses/116493254329241595</guid><dc:creator><![CDATA[clonejo@social.troll.academy]]></dc:creator><pubDate>Thu, 30 Apr 2026 10:46:35 GMT</pubDate></item></channel></rss>