<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Quickly dove into the copy.fail exploit.]]></title><description><![CDATA[<p>Quickly dove into the copy.fail exploit.</p><p>1. Yes, it's real.<br />2. Current chain can write any arbitrary content to any user-readable file (into the page cache).<br />3. Current chain relies on an available target suid binary that you can open() as a lowpriv user.<br />4. Current exploit relies on that binary being /bin/su and then being able to execve(/bin/sh, 0, 0) (which doesn't work on alpine, etc.). The former is easily replaced in the code. The latter needs a rebuilt payload ELF (also easy).</p>]]></description><link>https://board.circlewithadot.net/topic/663b9e0b-af62-4aca-9ca2-2668ad45153f/quickly-dove-into-the-copy.fail-exploit.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 01 May 2026 03:05:38 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/663b9e0b-af62-4aca-9ca2-2668ad45153f.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 22:02:21 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Thu, 30 Apr 2026 01:07:14 GMT]]></title><description><![CDATA[<p><span><a href="/user/kasperd%40westergaard.social">@<span>kasperd</span></a></span> <span><a href="/user/penguin42%40mastodon.org.uk">@<span>penguin42</span></a></span> While I am a security consultant I am not _your_ security consultant, so the best I can offer you is an enthusiastic 'yeah, I guess so!'.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490976292953574</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490976292953574</guid><dc:creator><![CDATA[q3k@social.hackerspace.pl]]></dc:creator><pubDate>Thu, 30 Apr 2026 01:07:14 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:49:54 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span> ..if your distro hasn't built that in.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.org.uk/users/penguin42/statuses/116490672163338188</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.org.uk/users/penguin42/statuses/116490672163338188</guid><dc:creator><![CDATA[penguin42@mastodon.org.uk]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:49:54 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:49:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/penguin42%40mastodon.org.uk">@<span>penguin42</span></a></span> Yeah, or just yeet the vulnerable module (`algif_aead`).</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490669710966123</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490669710966123</guid><dc:creator><![CDATA[q3k@social.hackerspace.pl]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:49:16 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:48:28 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span> So I guess you can disable it by a seccomp or bpf that blocks hmm, socket(2) with AF_ALG ?</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.org.uk/users/penguin42/statuses/116490666535231062</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.org.uk/users/penguin42/statuses/116490666535231062</guid><dc:creator><![CDATA[penguin42@mastodon.org.uk]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:48:28 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:42:48 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span> working around the broken execve is trivial enough like you said; <a href="https://social.treehouse.systems/@astraleureka/116490148181953204" rel="nofollow noopener"><span>https://</span><span>social.treehouse.systems/@astr</span><span>aleureka/116490148181953204</span></a><br />it's pretty amusing seeing the trodden pagecache results persist afterwards</p>]]></description><link>https://board.circlewithadot.net/post/https://social.treehouse.systems/users/astraleureka/statuses/116490644270529061</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.treehouse.systems/users/astraleureka/statuses/116490644270529061</guid><dc:creator><![CDATA[astraleureka@social.treehouse.systems]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:42:48 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:33:53 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span><br /><span><a href="/user/implr%40social.hackerspace.pl">@<span>implr</span></a></span> <br />people have done that with dirtypipe before <a href="https://github.com/polygraphene/DirtyPipe-Android/blob/master/TECHNICAL-DETAILS.md" rel="nofollow noopener"><span>https://</span><span>github.com/polygraphene/DirtyP</span><span>ipe-Android/blob/master/TECHNICAL-DETAILS.md</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://mstdn.io/users/wolf480pl/statuses/116490609189694927</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mstdn.io/users/wolf480pl/statuses/116490609189694927</guid><dc:creator><![CDATA[wolf480pl@mstdn.io]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:33:53 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:17:54 GMT]]></title><description><![CDATA[<p><span><a href="/user/implr%40social.hackerspace.pl">@<span>implr</span></a></span> <span><a href="/user/wolf480pl%40mstdn.io">@<span>wolf480pl</span></a></span> You can just write to any running process' .text if you have access to the binary.</p><p>You should just be able to write a better implementation of close() into /lib/libc.so.6 - one that also drops you a +s, no questions asked su in /tmp before actually closing the file, and wait until a privileged process bites.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490546334231842</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490546334231842</guid><dc:creator><![CDATA[q3k@social.hackerspace.pl]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:17:54 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:04:18 GMT]]></title><description><![CDATA[<p><span><a href="/user/wolf480pl%40mstdn.io">@<span>wolf480pl</span></a></span> <span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span> <br />If you managed to get the page swapped out first (with an oom condition or sth), then probably yes, but idk how the page cache interacts with .text mappings to be sure.<br />If that is possible, then there should be plenty of tasty targets in pid1 - systemd is a pretty thicc binary</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/implr/statuses/116490492885955148</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/implr/statuses/116490492885955148</guid><dc:creator><![CDATA[implr@social.hackerspace.pl]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:04:18 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 23:03:59 GMT]]></title><description><![CDATA[<p><span><a href="/user/wolf480pl%40mstdn.io">@<span>wolf480pl</span></a></span> Yes.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490491634960802</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490491634960802</guid><dc:creator><![CDATA[q3k@social.hackerspace.pl]]></dc:creator><pubDate>Wed, 29 Apr 2026 23:03:59 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 22:44:07 GMT]]></title><description><![CDATA[<p><span><a href="/user/penguin42%40mastodon.org.uk">@<span>penguin42</span></a></span> Right, I'm just talking about the current exploit. I just managed to inject code into an arbitrary process by opening its file, too.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490413481802795</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490413481802795</guid><dc:creator><![CDATA[q3k@social.hackerspace.pl]]></dc:creator><pubDate>Wed, 29 Apr 2026 22:44:07 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 22:43:06 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span> I don't think you need any suid binary though; I mean, if you can modify an arbitrary file that you're allowed to open, you could change /etc/passwd or libc.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.org.uk/users/penguin42/statuses/116490409486752827</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.org.uk/users/penguin42/statuses/116490409486752827</guid><dc:creator><![CDATA[penguin42@mastodon.org.uk]]></dc:creator><pubDate>Wed, 29 Apr 2026 22:43:06 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 22:32:19 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl" rel="nofollow noopener">@<span>q3k</span></a></span> Another route would be to patch a root password hash into <code>/etc/passwd</code> (yes, that still works though shadow passwords have been a thing for decades) and use any login mechanism with that password.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116490367079007253</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/hillu/statuses/116490367079007253</guid><dc:creator><![CDATA[hillu@infosec.exchange]]></dc:creator><pubDate>Wed, 29 Apr 2026 22:32:19 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 22:27:48 GMT]]></title><description><![CDATA[<p>Oh yeah the above will turn your /bin/ping into a setuid(0) su until you drop caches (maybe) or reboot. So, uh, keep that in mind.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490349317937955</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490349317937955</guid><dc:creator><![CDATA[q3k@social.hackerspace.pl]]></dc:creator><pubDate>Wed, 29 Apr 2026 22:27:48 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 22:13:12 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span> would this primitive also work for overwriting code of an already-running privileged process?</p>]]></description><link>https://board.circlewithadot.net/post/https://mstdn.io/users/wolf480pl/statuses/116490291952967124</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mstdn.io/users/wolf480pl/statuses/116490291952967124</guid><dc:creator><![CDATA[wolf480pl@mstdn.io]]></dc:creator><pubDate>Wed, 29 Apr 2026 22:13:12 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 22:09:26 GMT]]></title><description><![CDATA[<p><span><a href="/user/q3k%40social.hackerspace.pl">@<span>q3k</span></a></span> ayy I was wondering about the Alpine suid situation, blacklisted the alg module to be sure, nice job</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/shiz/statuses/116490277140504606</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/shiz/statuses/116490277140504606</guid><dc:creator><![CDATA[shiz@mastodon.social]]></dc:creator><pubDate>Wed, 29 Apr 2026 22:09:26 GMT</pubDate></item><item><title><![CDATA[Reply to Quickly dove into the copy.fail exploit. on Wed, 29 Apr 2026 22:05:45 GMT]]></title><description><![CDATA[<p>5. The authors say they have other chains (including ones that allow container escapes). I believe them.<br />6. A mildly de-minified PoC for Alpine with a new payload ELF is at hackerspace[pl]/~q3k/alpine.py . You'll need /bin/ping from iputils. Tested on an ancient Alpine ISO from my cringe^Wdownloads directory.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490262660109178</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.hackerspace.pl/users/q3k/statuses/116490262660109178</guid><dc:creator><![CDATA[q3k@social.hackerspace.pl]]></dc:creator><pubDate>Wed, 29 Apr 2026 22:05:45 GMT</pubDate></item></channel></rss>