this post was submitted on 23 Sep 2024
67 points (100.0% liked)

Linux

1253 readers
58 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

EDIT: Original post seems to have been removed, try this Nitter mirror instead.

top 19 comments
sorted by: hot top controversial new old
[–] superglue@lemmy.dbzer0.com 3 points 2 days ago* (last edited 2 days ago) (1 children)

Looks like its out there now:

https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/

Short version (correct me if I'm wrong):

If you have CUPS service cups-browsed on your machine and you for some reason exposed that to the internet (port 631), you are about to get pwned.

EDIT: It also requires the user to print to the malicious fake printer.

[–] treasure@feddit.org 2 points 2 days ago

Yeah, what a disappointment. This guy brought shame to the security community because he was salty that his vulnerability didn't get the attention it "deserved".

[–] narc0tic_bird@lemm.ee 31 points 5 days ago (2 children)

Let's see if this really affects all Linux systems or if the stars need to align for this to actually be exploitable.

[–] ShortN0te@lemmy.ml 9 points 5 days ago

I agree, all this attention grabbing sound to me as if this is actually not a big deal. But we will see i guess.

[–] possiblylinux127@lemmy.zip 6 points 5 days ago

A 9.9 is pretty bad no matter what. They wouldn't rank it almost a 10 if it was some obscure bug that is very hard to exploit.

With that being said it is hard to know without details

[–] notfromhere@lemmy.ml 11 points 5 days ago (1 children)

Nitter link not working. What’s the jist?

[–] treasure@feddit.org 14 points 5 days ago (2 children)

This link should be working.

Quoting from the OP tweet:

* Unauthenticated RCE vs all GNU/Linux systems (plus others) disclosed 3 weeks ago.
* Full disclosure happening in less than 2 weeks (as agreed with devs).
* Still no CVE assigned (there should be at least 3, possibly 4, ideally 6).
* Still no working fix.
* Canonical, RedHat and others have confirmed the severity, a 9.9, check screenshot.
* Devs are still arguing about whether or not some of the issues have a security impact.

I've spent the last 3 weeks of my sabbatical working full time on this research, reporting, coordination and so on with the sole purpose of helping and pretty much only got patronized because the devs just can't accept that their code is crap - responsible disclosure: no more.

[–] LiveLM@lemmy.zip 7 points 5 days ago

Seems like he not only deleted the Tweet but also protected his whole account... Very weird...

[–] Lemmchen@feddit.org 5 points 5 days ago (1 children)
[–] possiblylinux127@lemmy.zip 6 points 5 days ago (1 children)

The real question what is the exploitability score

[–] caseyweederman@lemmy.ca 1 points 4 days ago (1 children)

I've noticed Canonical replaced their score breakdown with an ad for their paid services.

[–] possiblylinux127@lemmy.zip 2 points 4 days ago (1 children)

That probably means this is closer to a publicity stunt. I'll just wait until there is more information.

[–] caseyweederman@lemmy.ca 1 points 4 days ago

No, I mean for every USN

[–] Laser@feddit.org 10 points 5 days ago (1 children)

Since this affects Linux and others, I'm guessing this is about OpenSSH. But I'm not very certain. Just can't think of another candidate.

But holy sh, if your software has been running on everything for the last 20 years

This doesn't sound like glibc as someone in the thread guessed.

[–] Strit@lemmy.linuxuserspace.show 5 points 5 days ago (1 children)

Could be quite a few different things.

Could be the kernel itself, gnupg, openSSH or even bash.

But we won't know for sure, until it's publically disclosed.

[–] Laser@feddit.org 5 points 5 days ago

Could be the kernel itself

Wouldn't make sense to me because the thread says GNU/Linux and others, though this could relate to Android or distros not using any GNU.

gnupg

Usually not exposed to the network though, but it's generally a mess so wouldn't be too surprising

Another candidate I have in mind is ntpd, but again that is usually not easily accessible from outside and not used everywhere, as stuff like systemd-timesyncd exists.

Just want to stress that I'm not sure about it being OpenSSH, it was more supposed to be a fun guess than a certain prediction

[–] gomp@lemmy.ml 9 points 5 days ago

I guess I'll worry about this in 2 weeks then

[–] KarnaSubarna@lemmy.ml 6 points 4 days ago

More important question is - how this nitter instance is still working!!

[–] doubtingtammy@lemmy.ml 3 points 4 days ago

Gotta wonder how many state actors have been using it for years.