The latest Linux kernel git now has a fix for CVE-2018-8781 which has allowed local privilege escalation on GNU/Linux systems for SIX YEARS. The vulnerability was introduced in Kernel 3.4 and has been present ever since.
>have local access to GNU/Linux system >have DisplayLink DRM adapter >get full read/write permission to physical pages >execute all the code you want in kernel space
This is specially worrying for co-located servers and things like that where someone could be the janitor or dress up as the janitor and exploit your system given that they first have a regular account.
Why would you have a display link driver on a headless server?
Benjamin Harris
...because you installed your average distribution which is compiled with CONFIG_DRM_UDL set to m?
This module is present on your system unless you compiled your own kernel. You can check it out for yourself, see if you have udl.ko is found in /lib/modulds/-kernelversion-/kernel/drivers/gpu/drm/udl/udl.ko It's not automatically loaded unless you actually have a displaylink adapter plugged in but if you do and you have a normal local user account then you win
Noah Johnson
>have DisplayLink DRM adapter >DRM there is your problem
>Those fugly fonts I hope you don't work on that machine
David Kelly
Oy Vey, the kernel developers found another (((bug))). Don't worry goy, it was a coding mistake. Btw linus, please merge this 300 lines of code, it'll give you better speed. Don't worry.
btw: > 18 March 2018 – Vulnerability was disclosed to the Linux Kernel. > 18 March 2018 – Linux issued a patch and asked for us to verify it. > 18 March 2018 – We verified the patch and gave a “Green light” to continue. > 21 March 2018 – An official Linux patch was issued for CVE 2018-8781. > 21 March 2018 – The patch was integrated to the Linux Kernel.
Jack Thompson
Well, yes, but not really. As good as all distributions have module autoloading enabled so connecting a displaylink adapter would be enough to make the kernel load it. So it's bad. But I do feel compelled to point out that if you have physical access to a computer you're generally able to grab it and run or open it and clone the harddrive.
Module autoloading on anything that needs security it's retarded
Lucas King
>have local access compromised by default
Tyler Adams
why are waifufags always dumb
Christian Ramirez
Never seen a DisplayLink adapter. It's some shitty properiatary USB display technology.
Chase Cox
It's a very basic USB "graphics card" adapter, you plug it into your computers USB port and connect a monitor (or two, even) to the adapter and you're set to go. It's fine for simple 2D tasks. There's USB 3.0 adapters around $100 that do dual 4k at 60Hz.
That's nice but it is the default setting on all the distributions. And it's nice that you can plug-in a USB HDD or connect a printer and it works and you don't have to spend hours figuring out what modules are required.
grep UDL /boot/config-4.14.38 # CONFIG_DRM_UDL is not set # CONFIG_FB_UDL is not set wew, that was close
Brody Roberts
Brb, emerging and compiling a newer kernel
Grayson Robinson
Thats why Gento is a loot better security, storage and performance-wise
Jose Howard
There is some font which could be better
Samuel Murphy
If someone have physical access to your PC, than it's not your PC.
Luis Brooks
> 3 day turn around on an issue that affects nobody of importance God damn I love Linux
Connor Garcia
So glad I use gentoo and don't load bullshit modules
Kevin Lee
I actually strongly disagree with this - heavily depending on the case. Some can and do setup Gentoo very securely. Most just "install gentoo" and don't even configure a firewall because they don't know how and don't know what the commands they typed into a terminal when they installed it did either.
Caleb Richardson
That's it. I'm switching back to macOS.
Zachary Thompson
Even consolas is better.
Cooper Perez
Just propose a really good one, just name a console font to try.
>have local access to GNU/Linux system well there's your fucking problem
Landon Anderson
Physical access security bugs are bugs, they should be fixed. But really, it's far from being a serious bug. Why would a hacker go through such lengths to exploit that bug instead of you know, booting with a flash drive or something and changing whatever he wants? He has physical access.
Ayden Ross
Lennart Poettering is on the case user, don’t worry.