frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

CVE-2026-31431: Copy Fail vs. rootless containers

https://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/
42•averi•1h ago

Comments

washbasin•1h ago
Please post a tl;dr at the top or even in the subject. Many of us are scrambling to patch/reboot our **.
donaldjbiden•53m ago
This isn't a new CVE. It's just documenting what happened when this person ran the exploit inside a certain type of container.
isityettime•35m ago
It already has a table of contents. The heading titled "why rootless containers stopped the escalation" is your tl;dr.
eqvinox•1h ago
Running sstrip on an ELF binary is called ELF "golfing"? TIL…
2bitencryption•1h ago
tl;dr - within the container, the exploit works, and elevates to root (uid 0) within the container - BUT because that namespace actually maps to uid 1000 (the user) outside the container, the escalation does not flow up to the host.

But… does this escape the container? If not (the author seems to indicate it does not) then does it matter if you are in Docker or rootless Podman, right, since the end result is always: you have elevated to root within the container. If the rest of the container filesystem isolation does its job, the end result is the same? Though I guess another chained exploit to escape the container would be worse in Docker? Do I have that right?

amluto•1h ago
Sigh.

1. I would hope the default seccomp policy blocks AF_ALG in these containers. I bet it doesn’t. Oh well.

2. The write-to-RO-page-cache primitive STILL WORKED! It’s just that the particular exploit used had no meaningful effect in the already-root-in-a-container context. If you think you are safe, you’re probably wrong. All you need to make a new exploit is an fd representing something that you aren’t supposed to be able to write. This likely includes CoW things where you are supposed to be able to write after CoW but you aren’t supposed to be able to write to the source.

So:

- Are you using these containers with a common image or even a common layer in an image to isolate dangerous workloads from each other. Oops, they can modify the image layers and corrupt each other. There goes any sort of cross-tenant isolation.

- What if you get an fd backed by the zero page and write to it? This can’t result in anything that the administrator would approve of.

- What if you ro-bind-mount something in? It’s not ro any more.

hlieberman•32m ago
In fact, the authors specifically say on the very first line of their website that the copy/fail primitive can be used as a container escape. The entire premise of this article is flawed and irresponsible.
averi•36m ago
@amluto, fair points, I still consider this vulnerability extremely severe as yes, if you use rootless containers the attacker won't be able to get root on the host and with that injecting additional potential malware, but at the same time for containers re-using the same image layers it will give the ability to poison those binaries in memory and break to some extent the container to container isolation.

If we weren't looking into moving away from using containers completely into using ephemeral microVMs one area I'd invest in would be replicating what CargoWall does for GitHub actions in GitLab CI. At that point even if the attacker gained access to a container, modified a binary with some specific instructions (like reading env vars and sending them to an external server) it'd not be able to send credentials or fetch a malware remotely at all due to the DNS queries being intercepted by eBPF and being sent to a CoreDNS proxy.

I still think rootless containers increase the attack vector complexity in more than just a one liner into an attack scenario that, at that point, should also involve understanding additional details about the underlying host with information such as, as you correctly pointed out, what container images (and thus shared image layers) are present and also whether these images use setuid binaries which specific CI jobs explicitly call throughout the build process (kind of unusual to see anyone running a setuid binary in a CI pipeline anyway as that is generally an action that would result in a permission denied in normal conditions).

Titan2189•20m ago
> [...] that root was just my unprivileged podman user on the host

Couldn't you then simply re-run the exploit again as unprivileged podman user and gain root on the host?

averi•18m ago
@hlieberman, the researchers imply container escape == root access on the target host, that is why they used a setuid binary in order to demonstrate the whole exploit. What this article mentions is that while the container escape (as in the ability to modify a binary in memory that may be shared across multiple containers) is still present gaining root in the underlying host doesn't happen.

@isityettime, the vulnerability happens not because of file contents being modified on disk (think of a base image that is shared across multiple CI builds) rather because a binary in one base image shares the same inode (and thus the same address space in memory as an optimization) as the same binary in another container, meaning container B will execute a poisoned binary and that's where the "container escape" happens.

averi•9m ago
@titan2189, in a rootless Podman environment, the User Namespace acts as a constant translator between the container and the underlying host. Let's say you re-run the exploit, setuid(0) is run, kernel responds with a 0 (success) return code, you'd still be "trapped" inside the user namespace, which in turn maps your (root) user to an unprivileged user.

Anthropic entering AI services business

https://www.anthropic.com/news/enterprise-ai-services-company
1•darshanmakwana•35s ago•0 comments

Wolfgang Koeppen's Structural Musicality

https://www.theparisreview.org/blog/2026/05/04/wolfgang-koeppens-structural-musicality/
1•prismatic•5m ago•0 comments

What Silicon Valley layoffs hide about the future of the job market

https://www.washingtonpost.com/technology/2026/05/01/ai-jobs-tech-layoffs-austerity/
1•1vuio0pswjnm7•5m ago•1 comments

Major Ubuntu Outage

https://status.canonical.com/#/incident/KNms6QK9ewuzz-7xUsPsNylV20jEt5kyKsd8A-3ptQEbtT2eC1f61ywPf...
1•NiekvdMaas•5m ago•0 comments

I built a WordPress AI agent that handles sales and support (No monthly fees)

https://www.indiehackers.com/post/i-built-a-wordpress-ai-agent-that-handles-sales-and-support-no-...
1•shahisoft•9m ago•0 comments

Why Does a Single Firefox Tab Take Almost 1.5GB RAM?

3•syeare•11m ago•0 comments

Kavya – A local-first Markdown writing app for macOS

https://kavya-app.com/
1•juanmanuelf•13m ago•0 comments

OpenAI president defends motives in for-profit restructuring, reveals $30B stake

https://www.ft.com/content/5c24fa13-ae43-4d5a-9b68-b6ebae227dce
1•1vuio0pswjnm7•19m ago•1 comments

Anthropic co-founder Jack Clark: 60%+ chance of automated AI R&D by 2029

https://importai.substack.com/p/import-ai-455-automating-ai-research
4•thoughtpeddler•21m ago•1 comments

Kenya: AI was used to load Health System costs onto poorest

https://sha.africauncensored.online/
2•gmargari•21m ago•0 comments

Apple Plans to Let Users Build Their Own Passes in iOS 27 Wallet App

https://www.bloomberg.com/news/articles/2026-05-04/ios-27-features-apple-plans-to-let-users-build...
3•petethomas•21m ago•0 comments

Why Your Country Sucks-A World Cup Satire from Mexico City

https://almaasfalto.com/why-your-country-sucks/
2•JFWFTW•23m ago•0 comments

Halley's Comet Meteor Shower (Eta Aquariids) About to Peak

https://www.sciencealert.com/look-up-the-halleys-comet-meteor-shower-is-just-about-to-peak
2•Gaishan•24m ago•0 comments

'Engineer' is so 2025. In AI land, everyone's a 'builder' now

https://sfstandard.com/2026/03/05/engineer-2025-ai-land-everyone-s-builder-now/
2•geetee•25m ago•0 comments

OpenClaw Got Safer in Public

https://openclaw.ai/blog/openclaw-security-in-public
3•drippurp•25m ago•0 comments

Ask HN: Why would we care about "extended time horizons" and LLMs?

2•ozozozd•29m ago•1 comments

Why China Didn't Colonise the World

https://twitter.com/petruch10/status/2051127478132113892
2•MrBuddyCasino•31m ago•0 comments

Taiwan Could Learn from Ukraine. Informally, Connections Are Growing

https://www.nytimes.com/2026/05/05/world/europe/ukraine-taiwan-drones.html
3•mikhael•35m ago•0 comments

Ask HN:How's you experience building an app on Cloudflare? (Workers, D1,R2 etc.)

4•indieDevAttempt•36m ago•0 comments

Why is Apple's R&D run rate suddenly $40B/yr.?

https://asymco.com/2026/05/04/why-is-apples-rd-run-rate-suddenly-40-billion-yr/
3•ndr42•37m ago•0 comments

OpenAI can't build working RSS feeds

https://openai.com/news/rss.xml
6•johnnyAghands•37m ago•2 comments

Cybercrime investigations in practice: Insights from the LockerGoga case

https://www.sciencedirect.com/science/article/pii/S2666281726000685
2•Manheim•37m ago•0 comments

Anthropic Unveils $1.5B Joint Venture with Wall Street Firms

https://www.wsj.com/business/deals/anthropic-nears-1-5-billion-joint-venture-with-wall-street-fir...
3•erhuve•41m ago•0 comments

Kids bypass age verification with fake moustaches

https://www.theregister.com/2026/05/04/uk_online_safety_act_age_checks_subvert/
6•dreadsword•41m ago•0 comments

About 10% of AMC movie showings sell zero tickets. This site finds them

https://walzr.com/empty-screenings
34•MrBuddyCasino•44m ago•13 comments

(Author Is) Suing the DOJ and the FBI

https://this.weekinsecurity.com/plot-twist-i-am-suing-the-justice-department-and-fbi/
3•sans_souse•48m ago•1 comments

Ethan Mollick: Taste is becoming a key skill in the AI era

https://www.businessinsider.com/ethan-mollick-ai-expert-wharton-taste-skills-ai-2026-5
4•sahar_builds•49m ago•0 comments

2-D Mathematical Curves

https://www.2dcurves.com/
3•the-mitr•50m ago•0 comments

Lattice Semiconductor acquires AMI, maker of server firmware

https://www.oregonlive.com/silicon-forest/2026/05/oregon-based-lattice-semiconductor-buys-georgia...
2•ojn•1h ago•0 comments

// Bookmarks: Firefox Bookmark Manager

https://lebcit.github.io/post/bookmarks-firefox-bookmark-manager/
3•LebCit•1h ago•2 comments