This vulnerability, hidden within the netfilter: nf_tables component, allows local attackers to escalate their privileges and potentially deploy ransomware, which could severely disrupt enterprise systems worldwide.

  • turdas@suppo.fi
    link
    fedilink
    English
    arrow-up
    90
    ·
    5 days ago

    This only affects positively ancient kernels:

    From (including) 3.15 Up to (excluding) 5.15.149 From (including) 6.1 Up to (excluding) 6.1.76 From (including) 6.2 Up to (excluding) 6.6.15 From (including) 6.7 Up to (excluding) 6.7.3

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    30
    ·
    5 days ago

    For exploiting a privilege escalation the attacker must be able to run their own code on your machine. If you let them do such things, you already have more than enough security problems in the first place.

    • okamiueru@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      5 days ago

      Except for supply chain attacks. You get a foot in the door, and open the rest with impunity

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 days ago

        Yes, but still a privilege elevation bug is still less risky than a remote execution one.

  • ScoffingLizard@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 days ago

    I read: Microsoft started to feel threatened and paid black hats to exploit vulnerabilities in wares that people have recently learned are far superior to their goddamned surveillance garbage.

      • dragonfly4933@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        28
        ·
        5 days ago

        Explain how a use after free could occur in safe rust, because to my knowledge, that is exactly the kind of thing rust does protect against.

      • Noja@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        5
        ·
        5 days ago

        You never say “would not of”. It’s “would not have”.

        Rust would have prevented this, because the borrow checker prevents use-after-free vulnerabilites.

      • Zangoose@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        5 days ago

        Do you know what a use-after-free bug is? Rust was literally designed to make this type of memory bug impossible.

    • Zangoose@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      5 days ago

      But then the kernel wouldn’t be free! Free as in ‘use-after-free’!

      (/s in case it wasn’t obvious)

    • Shanmugha@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      5 days ago

      Magical pills do not exist. Better start pushing old fuckers incapable of learning out of the project (yeah, I don’t like this kind of treatment of Rust just because it is not C either)

      • Quazatron@lemmy.world
        link
        fedilink
        English
        arrow-up
        20
        ·
        5 days ago

        Old fuckers exist to protect young fuckers from throwing out the baby with the bath water.

        • Quazatron@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          4 days ago

          I’m referring to the ageism implied in the statement, I don’t care about C vs Rust any more than I care about vi vs emacs or KDE vs Gnome.

          Old fuckers have experience, they have seen many next big things come and go, that’s why they seem slow to adopt new stuff. Of course this annoys new fuckers a lot, as they want to play with their new shiny toys now.

          Patience is a virtue, young grasshopper.

        • Shanmugha@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 days ago

          Ooh, so “get out with this Rust, I ain’t gonna think about when writing my code” is protecting a baby now?

    • ZILtoid1991@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 days ago

      Okay, then why we need to use a language that has more in common with OCaml? What about using a better C instead?

    • henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      25
      ·
      5 days ago

      You need to be able to run code on the system that has the bug. The bug is in the netfilter component, in how it’s managed on that system, not in the actual traffic flows.

      • BCsven@lemmy.ca
        link
        fedilink
        English
        arrow-up
        11
        ·
        5 days ago

        So a non issue unless somebody has physical access to the machine?

        • who@feddit.org
          link
          fedilink
          English
          arrow-up
          22
          ·
          edit-2
          5 days ago

          Unfortunately, it’s not that simple, because attacks often involve “exploit chains”. In this case, an attacker would use a different vulnerability to gain code execution capability, and then use that capability to exploit this vulnerability.

          Update your systems, folks.

          • BCsven@lemmy.ca
            link
            fedilink
            English
            arrow-up
            4
            ·
            5 days ago

            If they can place exploit code on my machine, I think its already game over, regardless of that bug

            • CriticalMiss@lemmy.world
              link
              fedilink
              English
              arrow-up
              8
              ·
              5 days ago

              Not necessarily, if you follow proper hosting etiquette, then even if they break in they should only be a standard user and have no access to the rest of your system. But most self hosters just run everything as root as it’s less of a hassle.

              • BCsven@lemmy.ca
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 days ago

                I guess I was thinking of the many Linux users I have encountered that sets same user and root password, or has sudo as passwordless. SMH

        • henfredemars@infosec.pub
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 days ago

          Not directly, but as other comment has mentioned, it reduces the overall security posture because it could be combined with other flaws known and unknown.