Top
Best
New

Posted by unsnap_biceps 16 hours ago

Copy Fail(copy.fail)
941 points | 354 commentspage 6
dist-epoch 15 hours ago|
> Will you release the full PoC?

> Yes — it's on this page. We held it for a month while distros prepared patches; the major builds are out as of this writing.

There is no update available for Ubuntu 24, PoC works and just tried updating.

jchw 11 hours ago||
I tried this on NixOS, but it doesn't seem to be easily reproducible. There's no /usr/bin/su - okay, fine: I changed it to /run/wrappers/bin/su, but that didn't work, and I think the reason why is because the NixOS suid wrappers have +x but not +r:

    $ ls -lah /run/wrappers/bin/su
    -r-s--x--x 1 root root 70K Apr 27 11:09 /run/wrappers/bin/su
Not that this makes the underlying mechanism of the exploit any better, but I wonder what else you can do with it. Is there a way to target a suid binary that doesn't have +r? I guess all of the suid binaries necessarily don't, since the wrapper system doesn't grant it and you can't have suid binaries in the /nix/store.

I know it's also unrelated, but this is the most aggressively obvious LLM slop copy I've ever seen and it is a page with like 30 sentences. I guess we're just seriously doing this, huh?

chuso 2 hours ago|
It's the same with Gentoo, setuid binaries are installed without read permission.

But modifying a setuid binary is just the demo exploit that was published with the vulnerability disclosure. The vulnerability actually allows modifying four bytes in any readable file. That means system configuration files, other binaries intended to be run by root, libraries... It's not limited to modifying setuid binaries.

DetroitThrow 15 hours ago||
Despite the copy/images being weird about RHEL 14.3, this seems to work. Wow?
maxtaco 16 hours ago||
Use extreme caution running arbitrary code on your machines, especially obfuscated code that tickles kernel bugs! (edited)
stackghost 15 hours ago||
Analysis of the POC concurs with my tests that confirm that the portion of `su` that gets overwritten does not survive a reboot.
wang_li 14 hours ago||
it's living in your page cache, not on your disk. flush the caches and it'll disappear.
stackghost 11 hours ago||
Indeed. But it's easier to just kill a container or a k8s node and reprovision than to flush the caches
charcircuit 16 hours ago||
The page explicitly describes that it is stealthy as it does not make permanent changes, only corrupting the binary in memory.
scratchyone 13 hours ago||
unfortunately the page can also lie to you haha. it seems people have reviewed the code by now, but running suspicious shellcode you don't fully understand is never a great idea.
charcircuit 11 hours ago||
I personally had AI review the code, add comments, disassemble the shell code, etc.
scratchyone 11 hours ago||
that's quite smart. i was almost stupid enough to paste it into a terminal to check if it worked before deciding to wait and let others analyze it first haha
charcircuit 16 hours ago||
SUID binaries once again assisted a local privilege escalation attack. This is a major problem that distros can't keep ignoring.
marshray 12 hours ago|
There's a claim upthread that a straightforward variation works against /etc/passwd.
q3k 9 hours ago||
You can also just use this to patch libc and turn close() into close-but-also-give-me-a-root-shell().
themafia 16 hours ago||
> If your kernel was built between 2017 and the patch

This is why I compile my own kernel. I disable things I don't use. If it's not present it can't hurt you.

> block AF_ALG socket creation via seccomp regardless of patch state.

Likewise I use seccomp to only allow syscalls that are necessary. Everything else is disabled. In the programs I have that need to connect to a backend socket, that is done, and then socket creation is disabled.

tosti 13 hours ago|
Any pointers on how to set that up? Like, run all the things through strace, cut the first field, sort, uniq, run through some template and something somesuch what how?
nickcw 15 hours ago||
[dead]
FlyThruTheSun 10 hours ago||
[dead]
oncallthrow 12 hours ago|
[flagged]
More comments...