<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Holy. Fucking. Fuckballs.]]></title><description><![CDATA[<p>Holy. Fucking. Fuckballs.</p><p>This exploit is... insane.</p><p>&gt; An unprivileged local user can write 4 controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://copy.fail/" title="Copy Fail — 732 Bytes to Root">
<img src="https://copy.fail/og.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://copy.fail/">
Copy Fail — 732 Bytes to Root
</a>
</h5>
<p class="card-text line-clamp-3">Copy Fail (CVE-2026-31431): a 732-byte Linux LPE — straight-line, no race, no per-distro offsets. Same Python script roots Ubuntu, Amazon Linux, RHEL, SUSE since 2017. Page-cache write bypasses on-disk file-integrity tools and crosses container boundaries. Found by Xint Code.</p>
</div>
<a href="https://copy.fail/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://copy.fail/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0">Xint <span class="text-secondary">(copy.fail)</span></p>
</a>
</div></p><p><a href="https://chaosfurs.social/tags/copyfail" rel="tag">#<span>copyfail</span></a> <a href="https://chaosfurs.social/tags/linux" rel="tag">#<span>linux</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/62ded7b7-80de-4f06-a05f-1a905cd43949/holy.-fucking.-fuckballs.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 15:30:51 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/62ded7b7-80de-4f06-a05f-1a905cd43949.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 19:26:45 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Holy. Fucking. Fuckballs. on Thu, 30 Apr 2026 01:20:58 GMT]]></title><description><![CDATA[<p><a href="/user/drwho%40masto.hackers.town">@drwho@masto.hackers.town</a> <a href="/user/thibaultmol%40en.osm.town">@thibaultmol@en.osm.town</a> <a href="/user/darkrat%40chaosfurs.social">@darkrat@chaosfurs.social</a><span> <br />It is minified but really not difficult to pull apart. <br />It opens /usr/bin/su, then repeatedly calls c(f, i, e[i:i+4]) to write the embedded payload into the cached image of /usr/bin/su in 4-byte chunks. <br /><br />The write-up describes this. The sendmsg() data carries the 4 controlled bytes, splice() supplies the page-cache-backed file pages, and recv() triggers the authencesn path that writes those bytes into the cached file page.<br />After patching the cached copy, it just runs su. That's it.<br /><br />s.socket(38,5,0) are the numeric constants for AF_ALG and SOCK_SEQPACKET, it's equivalent to </span><code>socket.socket(socket.AF_ALG, socket.SOCK_SEQPACKET, 0)</code><span>.<br /><br />The zlib blob decompresses to a 160-byte ELF executable, it basically only contains: </span></p><pre><code>setuid(0)
execve("/bin/sh", NULL, NULL)
exit(0)</code></pre><span>to pop a root shell.<br /><br />The CVE is real; I got it to work just fine on my Proxmox host (Linux 6.17.13-2)</span><p></p>]]></description><link>https://board.circlewithadot.net/post/https://plasmatrap.com/notes/alod3jfzd0</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://plasmatrap.com/notes/alod3jfzd0</guid><dc:creator><![CDATA[privateger@plasmatrap.com]]></dc:creator><pubDate>Thu, 30 Apr 2026 01:20:58 GMT</pubDate></item><item><title><![CDATA[Reply to Holy. Fucking. Fuckballs. on Thu, 30 Apr 2026 01:08:24 GMT]]></title><description><![CDATA[<p><span><a href="/user/thibaultmol%40en.osm.town">@<span>thibaultmol</span></a></span> <span><a href="/user/darkrat%40chaosfurs.social">@<span>darkrat</span></a></span> It's needlessly obfuscated. And the "curl pipe bash" construction is just bullshit. </p><p>That said, a few of us tested it and it didn't work on our boxen.</p>]]></description><link>https://board.circlewithadot.net/post/https://masto.hackers.town/users/drwho/statuses/116490980854852172</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://masto.hackers.town/users/drwho/statuses/116490980854852172</guid><dc:creator><![CDATA[drwho@masto.hackers.town]]></dc:creator><pubDate>Thu, 30 Apr 2026 01:08:24 GMT</pubDate></item><item><title><![CDATA[Reply to Holy. Fucking. Fuckballs. on Wed, 29 Apr 2026 19:53:38 GMT]]></title><description><![CDATA[<p><span><a href="/user/darkrat%40chaosfurs.social">@<span>darkrat</span></a></span> It's weird how the code they want you to curl and run is minified and has a binary section in it.... just weird....</p><p>edit: tbc, my friend said this, I hadn't checked it yet.<br />He said that this is not normally how proof of concepts are written</p><p>I really hope someone on fedi who knows this stuff can verify this cause I'm not boosting it without seeing that</p>]]></description><link>https://board.circlewithadot.net/post/https://en.osm.town/users/thibaultmol/statuses/116489743148436860</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://en.osm.town/users/thibaultmol/statuses/116489743148436860</guid><dc:creator><![CDATA[thibaultmol@en.osm.town]]></dc:creator><pubDate>Wed, 29 Apr 2026 19:53:38 GMT</pubDate></item></channel></rss>