Hacker Newsnew | past | comments | ask | show | jobs | submit | oncallthrow's commentslogin

> this is why we don't run as root

The entire point is that you can escalate to root


can this also be used to obtain container escape ?

If your container has setuid binaries and these modules are loaded, yes.

With the exploits published as-is, you'll only get root inside the container: there's no explicit namespace break, and calling setuid() in a container just gives you root in the container.

However, it can be used to modify files that are passed into the container (e.g. Docker run -v), or files that are shared with other containers (e.g. other Docker containers sharing the same layers). kube-proxy with Kubernetes happens to share a trusted binary with containers by default, which is how it can be exploited: https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kuber...


It's poisoning the filesystem cache, if you don't have a setuid binary handy you just poison anything else that gets executed by the host.

You don't need any setuid binaries. You could just as easily use the vulnerability to add a job to crontab(5) that causes the cron daemon to run whatever you want as root.

And your containers need to have specific capabilities enabled, which aren't by default on kubernetes and podman.

Just use rps

Shame that this report is LLM-generated slop.

A GitHub README.md without a torrent of AI-generated slop? Refreshing


have you considered implementing a +- operator?

For example a +- b would be [a - b, a + b]


I’ve spent dozens of hours reading about the conflict on social media. I don’t think I’ve seen a single western account, outside of schizophrenic conspiracy theorist anons, saying that Iran is some paradise that can do no wrong.


Yes, because that quite literally isn’t “news”. Western leaders including the pope have condemned jihadism for decades.


No, it will likely be a state actor who reaches it first, who will never give away such a capability so easily


No, and even if we could, it would require a migration of approaching the same difficulty of a migration to PQ, at which point why not just migrate to PQ


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: