Lots of privilege escalations these days. But are there that many multiuser Linux systems nowadays ? I'm under the impression the whole landscape is either servers or single-user desktops (and ofc Android phones).
I impersonate multiple users on my machine for organizational reasons.
LPEs also potentially make user-level malware into system-level malware, which is only marginally more impactful for a single person on a desktop, but considerably harder to clean up. (It also broadens the range of what such malware could exfiltrate from me.)
Lots of privilege escalations these days. But are there that many multiuser Linux systems nowadays ? I'm under the impression the whole landscape is either servers or single-user desktops (and ofc Android phones).
I impersonate multiple users on my machine for organizational reasons.
LPEs also potentially make user-level malware into system-level malware, which is only marginally more impactful for a single person on a desktop, but considerably harder to clean up. (It also broadens the range of what such malware could exfiltrate from me.)
The idea is that you can exploit a service hosted on Linux to run these.
At what point do we all start rolling our own microkernels? This is kind of getting silly now... 4 now in the past month?
I hate that the Qubes OS people were right.
Sounds like this one is in the same kernel modules as dirtyfrag, so the existing mitigations (if in place) are sufficient.
RedHat's mitigation is this:
Are those correct for this exploit?https://access.redhat.com/security/vulnerabilities/RHSB-2026...
I don't know, but the problem with blocking esp4 and esp6 is that IPsec stops working, as I understand it.