[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: this_isnt_fine.jpg (36 KB, 474x266)
36 KB JPG
https://github.com/V4bel/dirtyfrag

Admin-kun get ready for patch Friday
>>
File: hacker feels bad.gif (1.44 MB, 720x720)
1.44 MB GIF
>>
>>108775336
lincels on suicide watch
>>
>>108775336
>Due to external factors, the embargo has been broken, so no patch exists for any distribution.
Get ready for "disable modules workaround" Friday
>>
>>108775385
ubuntu servers are always ddosed so i can't update even if i wanted to
>>
>>108775336
can people stop giving their LPEs clever names? your dime a dozen exploit isn't name worthy.
>>
File: file.png (834 KB, 1600x1200)
834 KB PNG
>>108775336
>Exploit doesn't work on FreeBSD
Great
>>
>>108775336
>on Ubuntu, the rxrpc.ko module is loaded by default
Once again the hack works because software you don't need is loaded by default. Gentoo chads, we win again.
>>
>>108775336
I'm using podman so I'm fine.
>>
>>108775336
we use IPsec so we're fucked :D
>>
File: 1728246509341579.jpg (456 KB, 1600x1170)
456 KB JPG
another 100% theoretical vulnerability with no real world usecase?
it's finally over Linux bros
>>
>>108777523
You have to explicitly blacklist them otherwise you are affected you turdmongler.
>>
>>108777593
The required modules are not compiled at all if you cared to debloat your kernel (if you install gentoo, chances are you did)
>>
>>108777599
Would be a shame if the official handbook would recommend distribution kernels that are in fact affected...

So i have to take manual steps like on ANY other distro to "prevent" the exploit. But hey i saved a few KB of disk space not including these modules. Hurr durr can't stop winning gentoo chads.
>>
Im not starting my computer today.
>>
>>108775336
>exploit doesn't work on gentoo custom kernel
>>
>>108777577
It's a threat to servers and especially shared computing environments (eg 'supercomputers'). The linux systems thay actually matter, not your basement pornplayer.
>>
>>108777633
modules get loaded into ram and when the code runs it consumes the cpu cycle
you turbo troglodyte
>>
>>108775336
I'm on CachyOS, just updated and restarted a few hours ago, doesn't seem to work on my system?
>>
File: 1773791439784827.png (88 KB, 244x248)
88 KB PNG
>>108775336
höhöhö no weekend for the kernel maintainers
>>
>This Dirty Frag has been tested on the following distribution versions.
>...
you fucking faggots, at least list all the distros you tested, fucking ai slop faggots
>>
File: 1770782125712849.png (2.36 MB, 1548x1024)
2.36 MB PNG
anotha one https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo
>>
>>108778290
>>exploit doesn't work on gentoo custom kernel
Great
>>
>>108778789
dead beef dead beef DE AD BE EF
>>
>>108775336
>another LPE
It's fucking nothing.
If you aren't allowing untrusted users to run code on your system, then none of these vulnerabilities affect you beyond a general "I guess if your system is already pwned, this could make their lateral movement easier".
If you ARE doing that then you need to do it in a VM, because containers are not security boundaries and they never were.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.