This vulnerability, hidden within the netfilter: nf_tables component, allows local attackers to escalate their privileges and potentially deploy ransomware, which could severely disrupt enterprise systems worldwide.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    1
    ·
    5 months ago

    For exploiting a privilege escalation the attacker must be able to run their own code on your machine. If you let them do such things, you already have more than enough security problems in the first place.

    • okamiueru@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      5 months ago

      Except for supply chain attacks. You get a foot in the door, and open the rest with impunity

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        5 months ago

        Yes, but still a privilege elevation bug is still less risky than a remote execution one.

        • JackbyDev@programming.dev
          link
          fedilink
          English
          arrow-up
          3
          ·
          5 months ago

          They’re replying to the victim blaming mentality of “if you let them then you have bigger problems” in your comment. Not your point about it being less dangerous than remote execution.

    • henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      17
      ·
      5 months ago

      You need to be able to run code on the system that has the bug. The bug is in the netfilter component, in how it’s managed on that system, not in the actual traffic flows.

      • BCsven@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        1
        ·
        5 months ago

        So a non issue unless somebody has physical access to the machine?

          • BCsven@lemmy.ca
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            2
            ·
            5 months ago

            If they can place exploit code on my machine, I think its already game over, regardless of that bug

            • CriticalMiss@lemmy.world
              link
              fedilink
              English
              arrow-up
              5
              ·
              5 months ago

              Not necessarily, if you follow proper hosting etiquette, then even if they break in they should only be a standard user and have no access to the rest of your system. But most self hosters just run everything as root as it’s less of a hassle.

              • BCsven@lemmy.ca
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 months ago

                I guess I was thinking of the many Linux users I have encountered that sets same user and root password, or has sudo as passwordless. SMH

        • henfredemars@infosec.pub
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          Not directly, but as other comment has mentioned, it reduces the overall security posture because it could be combined with other flaws known and unknown.

    • onlinepersona@programming.dev
      link
      fedilink
      English
      arrow-up
      20
      arrow-down
      2
      ·
      5 months ago

      But… You dont understand, Rust is the devil! If Rust were made the kernel’s main language it would terrible because that would mean change 😭😭😭

    • Zangoose@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      5 months ago

      But then the kernel wouldn’t be free! Free as in ‘use-after-free’!

      (/s in case it wasn’t obvious)

    • corsicanguppy@lemmy.ca
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      9
      ·
      5 months ago

      Yay! Pick an arbitrary solution to a problem just because it’s different and shiny! The shine will fix it!

    • Shanmugha@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      5 months ago

      Magical pills do not exist. Better start pushing old fuckers incapable of learning out of the project (yeah, I don’t like this kind of treatment of Rust just because it is not C either)

      • Quazatron@lemmy.world
        link
        fedilink
        English
        arrow-up
        13
        arrow-down
        1
        ·
        5 months ago

        Old fuckers exist to protect young fuckers from throwing out the baby with the bath water.

        • Quazatron@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          5 months ago

          I’m referring to the ageism implied in the statement, I don’t care about C vs Rust any more than I care about vi vs emacs or KDE vs Gnome.

          Old fuckers have experience, they have seen many next big things come and go, that’s why they seem slow to adopt new stuff. Of course this annoys new fuckers a lot, as they want to play with their new shiny toys now.

          Patience is a virtue, young grasshopper.

        • Shanmugha@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          5 months ago

          Ooh, so “get out with this Rust, I ain’t gonna think about when writing my code” is protecting a baby now?

    • ZILtoid1991@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      3
      ·
      5 months ago

      Okay, then why we need to use a language that has more in common with OCaml? What about using a better C instead?

        • henfredemars@infosec.pub
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          5 months ago

          Yes, that’s right. You cannot have a UAF situation unless you’re using unsafe “escape hatch” tools.

            • calcopiritus@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              ·
              5 months ago

              I’ve only seen it once. And it was made specifically to trigger a compiler bug. It barely looked like rust code.

              Now tell me how someone will introduce such a bug by accident. Winning the lottery 10000 times in a row with the same number isn’t impossible either. But we are engineers, not pure math pedantics. 0.000000000000001% probability for something that happens with less frequency than once per second is impossible.

        • just_another_person@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          6
          ·
          5 months ago

          Improbable. Everything has bugs that surface. See my other link, or look yourself. There have been plenty of security fixes for Rust. It’s not bulletproof, just like anything else, just less likely specifically for certain memory attacks to be vectors.

          • aubeynarf@lemmynsfw.com
            link
            fedilink
            English
            arrow-up
            6
            arrow-down
            1
            ·
            5 months ago

            Your link has nothing to do with bugs in Rust. It says attackers are writing their tools in Rust, which is making the attack tools more robust.

            attackers are smart, adaptable types, and they’ve discovered a different angle: malware written in Rust often shields itself using the very design principles we admire about the language. For us, as defenders, this means a steep learning curve and a shift in focus. Let’s break this down.

            • just_another_person@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              4
              ·
              5 months ago

              🤦 It’s not necessarily about bugs in Rust-lang, though you can lookup CVEs if you want. The point is that ANY software, by default, will have bugs and exploits. Doesn’t matter if it’s Rust or C. You can exploit at the core, or at implementation. It’s just matter of time and effort, as they say.

              Just flat out saying Rust, or software written in Rust is be default is secure, is a fool’s assertion. Sure it’s LESS LIKELY to have a memory exploit, but that’s where that assertion ends.

              • aubeynarf@lemmynsfw.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 months ago

                Just flat out saying Rust, or software written in Rust is be default is secure, is a fool’s assertion.

                Who said that, Mr. Strawman?

                It’s clearly better from both language feature and security standpoint and the community is behind it. What’s the problem?

                did you mean to post a different link?

        • AMoistGrandpa@lemmy.ca
          link
          fedilink
          English
          arrow-up
          5
          ·
          5 months ago

          Rust is a programming language which was designed to be memory safe without any of the overhead caused by traditional memory safety techniques employed by existing languages (namely, garbage collection and reference counting). It does this by shifting the memory management from happening at runtime to happening at compile time. The compiler forces the programmer to follow certain rules to ensure that their program can be proven to be free of errors such as use-after-frees and double-frees. Because of this design philosophy, Rust is a good fit as a replacement for C, because it can do everything that C can while ensuring the programmer doesn’t make any mistakes with regard to memory management.

  • ScoffingLizard@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    5 months ago

    I read: Microsoft started to feel threatened and paid black hats to exploit vulnerabilities in wares that people have recently learned are far superior to their goddamned surveillance garbage.