[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/pol/ - Politically Incorrect


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


it has worse security

man named Qualys finds ubuntu security problem

https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart

https://www.qualys.com/2024/11/19/needrestart/needrestart.txt

- CVE-2024-48990: Needrestart executes the Python interpreter with a PYTHONPATH environment variable extracted from running processes. If a local attacker controls this variable, they can execute arbitrary code as root during Python initialization by planting a malicious shared library.
- CVE-2024-48992: The Ruby interpreter used by needrestart is vulnerable when processing an attacker-controlled RUBYLIB environment variable. This allows local attackers to execute arbitrary Ruby code as root by injecting malicious libraries into the process.
- CVE-2024-48991: A race condition in needrestart allows a local attacker to replace the Python interpreter binary being validated with a malicious executable. By timing the replacement carefully, they can trick needrestart into running their code as root.
- CVE-2024-10224: Perl's ScanDeps module, used by needrestart, improperly handles filenames provided by the attacker. An attacker can craft filenames resembling shell commands (e.g., command|) to execute arbitrary commands as root when the file is opened.
- CVE-2024-11003: Needrestart's reliance on Perl's ScanDeps module exposes it to vulnerabilities in ScanDeps itself, where insecure use of eval() functions can lead to arbitrary code execution when processing attacker-controlled input.
>>
>>489103224
admirable taste in women, sir
>>
>>489103224
Windows is the most secure OS and it isn't even close
NSA uses W11, all tou need to know kek

they sure as hell ain't using Kali anymore
>>
>>489103406
It's only secure under specific configs.
>>
cope it's numerous times faster than windows now
you could probably run elden ring on a think pad on ubuntu now
>>
File: th-2546080056.jpg (21 KB, 474x651)
21 KB
21 KB JPG
>gnome
>snap
>>
>>489103530
>numerous times faster than windows now

not related to security
>>
>>489103473
it is the most secure unless you're trying to hack the US Government
Linux is a larp, in every single way at this point

unless you're a tranny who wants to rice their UI there is zero reason to use Linux in 2024
>>
>>489103224
>Ubuntu is the best of them
Who says this?
>>
File: MoBSD-l.gif (1010 KB, 450x680)
1010 KB
1010 KB GIF
>>489103224
Canonical spyware is NOT the way to go.
>>
there all local attack vectors, LPE vulnerabilities who fuckin cares faggot.

either apply the mitigation or patch. go complain somewhere else...these vulnerabilities are bottom of the barrel shit.

use arch.
>>
File: 1732141417920935.jpg (102 KB, 1079x1380)
102 KB
102 KB JPG
>>489103224
For me, it's arch linux, but everything is pozzed from tpm to bootloader to os, to GUI. It's all shit and every single system on the planet can be hacked. Real redpill is to not care about glowniggers, they can tongue my anus.
>>
>>489103972
>Have bunch of worthless wankers spying on you. They get asshurt because you pirate everything. They can’t accuse you of any crime since they are invading your privacy to find out what you are doing. Don’t give a fuck and using it as a gateway to free shit. Fuck em.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.