@noisytoot lovely. is this the same as the one that was mentioned on oss-security but with different framing, or actually its own that just happens to affect the same things somewhat?
@otter @9pfs did it completely fail to modify /etc/passwd or could you just not su - sick? the PoC seems to rely on you having nullok in your PAM configuration so an empty password is accepted, but if you just make it add a password as well it works without that.
also, at least on guix, resetting /etc/passwd (by –clean or clearing the page cache) does not seem to be enough to undo the exploit:
ron@t440p ~/P/Copy_Fail2-Electric_Boogaloo (main)> grep sick /etc/passwd
ron@t440p ~/P/Copy_Fail2-Electric_Boogaloo (main) [1]> getent passwd sick
sick:$1$SFhg3s7A$KAk5fEi/EmjSRL1Eb/NvO1:0:0:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:/:/bin/sh
ron@t440p ~/P/Copy_Fail2-Electric_Boogaloo (main)> su - sick
Password:
sick@t440p /#
where the hell is it reading from if not /etc/passwd?
@9pfs @otter … never mind, my dirtyfrag mitigation wasn’t actually working (I added it to /usr/local/lib/modprobe.d which was enough to make manually modprobing the modules fail, but they still got autoloaded)
now I bind-mounted /dev/null over the module files to ensure that nothing can load them and copyfail2 indeed does not work
@noisytoot that’s what I assume too, yeah. too many overlaps to not be at least related. there’s some differences too though… but I’ll wait for the actual security researchers to comment before saying much.