• nyan@sh.itjust.works
    link
    fedilink
    arrow-up
    19
    ·
    13 hours ago

    Exactly. It’s Yet Another Privilege Escalation Vulnerability. Unless you’re dealing with a multiuser machine, the attacker first needs to use some other vuln to get into an unprivileged account. Without that additional vulnerability, this exploit is useless.

    • solrize@lemmy.ml
      link
      fedilink
      arrow-up
      15
      ·
      12 hours ago

      some other vuln

      You mean like inveigling it into a pypi or npm or whatever package? Checks out.

      • olosta@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        2 hours ago

        I manage multi user systems and try to be on top of this and no, privilege escalation with a working public exploit are very rare. There’s quite a lot of CVEs with potential privilege excalation, but most of the time there is no real world exploit. And a large part of those are related to user namespaces in one way or another.

        This one is truly scary, at least the immediate mitigation is pretty straightforward.

      • nyan@sh.itjust.works
        link
        fedilink
        arrow-up
        5
        ·
        11 hours ago

        Well, it often feels like every “Linux security issue” flagged in the tech press is a privilege escalation, but I admit that I haven’t sat down and done the math.