This vulnerability, hidden within the netfilter: nf_tables component, allows local attackers to escalate their privileges and potentially deploy ransomware, which could severely disrupt enterprise systems worldwide.

  • BCsven@lemmy.ca
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 days ago

    So a non issue unless somebody has physical access to the machine?

    • who@feddit.org
      link
      fedilink
      English
      arrow-up
      19
      ·
      edit-2
      2 days ago

      Unfortunately, it’s not that simple, because attacks often involve “exploit chains”. In this case, an attacker would use a different vulnerability to gain code execution capability, and then use that capability to exploit this vulnerability.

      Update your systems, folks.

      • BCsven@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        If they can place exploit code on my machine, I think its already game over, regardless of that bug

        • CriticalMiss@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          2 days ago

          Not necessarily, if you follow proper hosting etiquette, then even if they break in they should only be a standard user and have no access to the rest of your system. But most self hosters just run everything as root as it’s less of a hassle.

          • BCsven@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 day ago

            I guess I was thinking of the many Linux users I have encountered that sets same user and root password, or has sudo as passwordless. SMH

    • henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 day ago

      Not directly, but as other comment has mentioned, it reduces the overall security posture because it could be combined with other flaws known and unknown.