• exuA
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    1 day ago

    No fancy domain, I rate this 7/10

    /s

  • HeyLow (she/her)🏳️‍⚧️@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    18
    arrow-down
    7
    ·
    1 day ago

    Oh wow another overblown privilege escalation bug that REQUIRES pre-existing access to a machine in order to actually be used. If someone has enough access to my machines to execute this they already have likely pwned all the information they want without needing root at all…

    • ISO@lemmy.zip
      link
      fedilink
      arrow-up
      9
      arrow-down
      1
      ·
      edit-2
      18 hours ago

      LPE is in the title. And you sound like someone who doesn’t know what that stands for.

      This also comes with a good public write-up on github (not some monetized fancy domain), with an explanation why it went public early, which wasn’t their fault.

      There is a lot of intelligence insulting going on in the security theater industry, which is something I talked about here more than once, despite not being exactly a prolific commentator. But unfortunately for you, this particular case is one of the least offensive.

    • Ooops@feddit.org
      link
      fedilink
      arrow-up
      3
      ·
      16 hours ago

      That may be true for private machines, but having user access to a machine, yet not be allowed admin rights is not actually a rare setup in the wild (read: servers… where the actual money is, not on that boring thing sitting under your desk)

    • Solemarc@lemmy.world
      link
      fedilink
      arrow-up
      14
      ·
      1 day ago

      It is a bit eye rolling “LOOK AT THIS DISASTER OF AN EXPLOIT!!!” *Requires physical access to the machine

      But the major issue is that if you have some other exploit that gets you RCE or a shell you can then use these exploits to pwn someone and we have RCE’s and shell exploits come around all the time.

    • lengau@midwest.social
      link
      fedilink
      arrow-up
      7
      ·
      1 day ago

      Desktop machines aren’t really the target of these kinds of attacks.

      Also I think the author in this case seems to have been pretty reasonable about what they did. If more of these issues were done this way I wouldn’t have nearly as much irritation about “branded bugs.”

  • entwine@programming.dev
    link
    fedilink
    arrow-up
    5
    ·
    1 day ago

    Are there any real life scenarios where an untrusted user is allowed access to a machine with an unprivileged account? I know there are (or were?) some public shared machines where you can ssh in for fun, but those aren’t serious.

    I’m thinking maybe a POS system or kiosk running Linux, and there’s shell access? This could possibly also be useful for jailbreaking devices that ship with Linux, but are locked down… Maybe like a car infotainment system?

    • Dumhuvud@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      ·
      18 hours ago

      In the Node.js world adding a dependency may lead to arbitrary code being executed.

      It’s bad enough on its own because a bad actor can steal SSH-keys this way, but combined with this exploit they will be able to install a rootkit and compromise your entire system.

    • nomad@infosec.pub
      link
      fedilink
      arrow-up
      1
      ·
      20 hours ago

      Only every local file inclusion bug ever. Include shellcode, run as webserver privs, escalate locally.

    • cm0002@europe.pubOP
      link
      fedilink
      arrow-up
      7
      ·
      1 day ago

      Pretty much all those examples, but the real danger is chaining this exploit with others

      Perhaps someone is sitting on a couple exploits to get them into a system, but only to an unprivileged user, this would be a great final act

    • Sunspear@piefed.social
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 day ago
      • 2026-05-07: Submitted detailed information about the vulnerability and the exploit to the linux-distros mailing list. The embargo was set to 5 days, with an agreement that if a third party publishes the exploit on the internet during the embargo period, the Dirty Frag exploit would be published publicly.
      • 2026-05-07: Detailed information and the exploit for this vulnerability were published publicly by an unrelated third party, breaking the embargo.

      Well, that’s reassuring - hopefully, since the patch for it is also described in the repo, distro maintainers can patch it quickly

      • Ooops@feddit.org
        link
        fedilink
        arrow-up
        3
        ·
        16 hours ago

        Update: Kernel 7.0.5 just released

        Fixes: cac2661c53f3 (“esp4: Avoid skb_cow_data whenever possible”)

        Fixes: 03e2a30f6a27 (“esp6: Avoid skb_cow_data whenever possible”)

        Fixes: 7da0dde68486 (“ip, udp: Support MSG_SPLICE_PAGES”)

        Fixes: 6d8192bd69bb (“ip6, udp6: Support MSG_SPLICE_PAGES”)