THE ABSOLUTE STATE OF LINUX/UNIX

HAHAHAHAHAHAHAHAHAHAHAHAHAHAHA

mobile.twitter.com/hackerfantastic/status/1055517801224396800

>New 0-day allowing for root privilege escalation

How long will you keep telling yourself that you're safe and secure instead of just using Windows like everyone else and actually getting work done?

Attached: file.png (334x393, 55K)

Other urls found in this thread:

phoronix.com/scan.php?page=article&item=nouveau-summer-2018&num=4
security.archlinux.org/CVE-2018-14665
twitter.com/NSFWRedditVideo

>Xorg

Literally nothing. Only server distros would be affected, and if you're running X on a *nix server, what the hell are you even doing?

Attached: setuid.png (517x141, 29K)

>if you have physical access you can do bad stuff
No shit. Is water wet?

Attached: damage-control.jpg (650x650, 188K)

Look in a mirror

I bet the fix is also already out there, it never takes long. Unlike in Windows which is a permanent swiss cheese.

Children, this is a troll. We don't reply to trolls. As you were.

Thx, patched

>Windows
>Getting work done
Can't do shit when Windows updates cause the OS to shit itself to fucking death. Switched to Linux and it never happened again. So now I'm getting work done instead of reloading my OS from a backup drive 4 fucking times on 2 separate laptops.

Water can't be wet as water can't have water on its surface.

This isn't about physical access though, you could do just the same over an ssh session.

From x11-base/xorg-server-1.19.5-r2.ebuild (latest stable):
IUSE="${IUSE_SERVERS} debug +glamor ipv6 libressl minimal selinux +suid systemd tslib +udev unwind xcsecurity"
The suid wrapper is enabled by default on Gentoo. And I was made fun of here maybe like a month ago for running Xorg as user, no suid, on my Gentoo system.
>hurrr why would you, that's stupid
>durrr it doesn't add any security
I wish I saved that internet argument(tm) so I could show everyone how I BTFO an autist on a Belarusian fishing forum.

>couldn't figure out how to block Windows updates

Oh yeah and anyone can just SSH into my fucking computer whenever they wan't right?

>He can't change a single value in the registry
The absolute state of linux powerusers

Attached: rartedtux.png (300x250, 12K)

Didn't work in Arch Linux, it said something about not being able to move shadow to shadow.old and then requested the root password.

What am I doing wrong?

>bragging about disabling updates in a thread about vulnerabilities
found the retards

also my system, as the large majority of linux systems, was not affected by this Xorg bug.

it was fixed in 1.20.3 version

not him. running xorg-xserver 1.20.2, and the exploit doesn't work on my computer (arch linux)
only a handful of distros are affected.

Another vulnerability which affects OpenBSD vanilla install.

Attached: 1538090812980.png (625x626, 111K)

I just mistyped this on my rig and it made my root user have no password and changed my user's password to God knows what lol

Luckily I was able to fix it. Seems like you could only do it locally though since you need to be on a ``real'' tty for it to work so I'm not worried about it too much. Is funny though

same here with void

oh it rotated out my entire old shadow file, thank god it rotated and not just overwrote

copied old file back

Sorry to spam this thread but I'm actually interested in security these days. This vulnerability looks so hilariously simple, could it not be used to modify literally any file you choose, and if this wasn't something recently introduced why did it take this long for someone to figure it out?

nice copy pasta
windows is for real men

I don't use xorg so the joke's on you bud.

Attached: 2000px-Wayland_Logo.svg.png (2000x2000, 119K)

>We don't reply to trolls.
Did I stumble into Bizarro Jow Forums or something? What year is this?

dad stop embarrassing me

No. But really, are you saying that local exploits just don't matter? That any user on the system should be able to just fuck up everything just because?
I bet you're probably one of the fags who then go on and talk shit about how you shouldn't run things as root

Not to mention that running things as a regular user is supposed to be another layer of security. If an user app like your browser or pdf reader is compromised, with this kind of local exploit, now your whole system is compromised.

Not a copy pasta you fucking shill. This happened repeatedly to both mine and my wife laptops with each update of Windows. Install mint and suddenly everything werks.
Your solution to upgrades making an operating system absolutely unusable is to disable them...and yet I'm the dumbass for leaving that madness behind? Hahahahahahahahahahahaja

Non tards have been using Wayland for years

>problem with Xorg that affects almost every *nix system
>"this is the fault of Linux!"
The utter state of microshills. Also
>CentOS 7.5 updated is immune to this. PAM steps in and refuses Xorg execution cause you don't own the console
Microshills BTFO. Enterprise Linux users get their shit patched before you can even blink.

Attached: 1536225999375.png (585x470, 25K)

I'm pretty sure water does have water on it's surface.

Nop, I'm running 1.20.1-1 (I sync only once per quarter)

so much tension

A liquid can never have itself coating its surface.

Man, OP really blew himself out of the water. It's as if he's too stupid to read the thread he posted. Some more gems:

>Xorg needs to be setuid for this to work, which it hasn't been for a while on most end-user distros

>On Arch, the /usr/lib/Xorg.wrap binary is setuid but it drops its privileges before calling execv on /usr/lib/Xorg (where the bug resides) and pass file descriptors so that it can do its job unprivileged. Problem completely mitigated unless you modify /etc/X11/Xwrapper.config.

Attached: 1535980560451.png (1026x918, 98K)

>any Xorg desktop affected
Literally zero of my Linux machines and only one VM affected.

Thats not how sets work, if there is a division between set A and identical set A then the only division is in terms of magnitude, they arent distinct sets simply different iterations

Attached: distro.jpg (1920x1080, 149K)

how do i get a big long pinus like that

>linux has a root scalation that's only exploitable locally
>meh, no problem
>macOS has a similar issue, exploitable locally only too
>ITODDLERS BTFO MACOS IS A PIECE OF INSECURE SHIT *shitpost this for at least two or three years*
Jow Forums as usual.

>>linux has a root scalation that's only exploitable locally
But it's not even all of Linux, some distros made stupid choices, not all of them.

Well, desu the macos thing was a more impressive thing visually, and more likely to be able to be done by non technical people

>ban evading linux thundercock

The Chad Linux using ban evader vs the virgin Jow Forums staff.

Lincucks already defended this.

>wincuck didn't even read the twitter thread he posted
God you're such a stupid pajeet. Poo in the loo.

Attached: 1535478819260.jpg (1080x1080, 144K)

>mocking others
>phone poster
you are dumb

NVIDIA USERS CAN'T EVEN USE WAYLAND HAHAHAHAHAHAHAHAHAHAHAH

LINUX IS SO SHIT HAHAHHA. ONLY PEDOPHILE LOLI ANIME FAGGOTS USE LINUX HAHAHAHHAHAHA

>broken english in all caps
Do the needful and take the poo to the loo.

Attached: tenor.png (512x480, 114K)

which OS has that cool cruise control?

>seething
Are you really this upset about my English skillz?

>opens mpv
>kazaykukamishi.mp4
>ROXXOR_RSCC4_FILTER (70% GPU USAGE)

How long it will take to people realize this kind of thread is fucking useless?

Attached: bait.jpg (1026x534, 165K)

>Are you really this upset about my English skillz?

Attached: am2bYzv_700b.jpg (700x789, 67K)

Just use nouveau friend.

>nouveau
HAHAHAHAHAHAHAHAHAHHA
phoronix.com/scan.php?page=article&item=nouveau-summer-2018&num=4

>USE NOUVEAU DRIVERS THEY SAID
PFFAHHAHAHAHAHAHAHAHHAH

Attached: firefox_2018-10-26_02-08-22.png (633x676, 21K)

Did Xorg get hacked by a Brony? Based.

a couple days for this bug
for stuff LIKE this bug, never

Attached: firefox_2018-10-25_20-12-04.png (892x238, 16K)

>muh games
Buy amd if you want to game.

Nope. See:
It's a paid pajeet shill thread.

i guess different densities of water can though; so a brine pool that's underwater could be classified as wet.

>implying that Mohandas and Rajesh don't summit spaghetti code to Linux

>2018
>still using the Rootkit Formerly Know as X.org
Photon MicroGUI is our salvation... In an ideal world.

Attached: μ A E S T H E T I C.png (1024x768, 139K)

Doesn't affect me. I run X as a Nonprivileged user. Seems like a nothingburger to me

It's funny that with free software exploits are found by developers and fixed before they can be exploited for malicious purposes, while proprietary software ignore the bugs, if they even know about them, until something happens. Security through obscurity is a farce.

>years

you know what an archive is?

factually it is for government monkeys

not him but metoo

>I run X as a Nonprivileged user.
everybody does desu

>because this always happens
I see confirmation bias here.

the conf looks like weston

Photon is more comfy than weston.

Learn to quote properly.

I'm quoting the exact post I meant to quote. Thanks.

so it is a libweston thing or ?

>owns openbsd
>arch isn't affected because it's wrapped drops privs before calling Xorg
whos the secure one now...

>t. windows shill
five rupees have been deposited into your account

>owns openbsd
>arch isn't affected because it's wrapper drops privs before calling Xorg
whos the secure one now...

I never said "because this always happens".

Attached: linus.jpg (575x467, 146K)

xD Epic meme

But who has Xorg installed setuid root these days? It's been like five years since it had to run as root.

And the first damages from CoC rear there head
When will people fucking learn to not give leftists an inch?

So this is the power of communism.

Already patched and it was upstream fault for not telling them.

>How long will you keep telling yourself that you're safe and secure instead of just using Windows like everyone else and actually getting work done?

>windows
>secure
pick one

Attached: 0.png (2000x2000, 2.42M)

>And the first damages from CoC rear there head
This has nothing to do with Linux, though. This is about Xorg. It affects systems that don't even use Linux, so what you are saying makes no sense.

>linuxfags start to act like it's not their problem but only xorg's

ahahahah how typical

You know Berkeley distributions don't use Linux, right?

security.archlinux.org/CVE-2018-14665
who runs xorg with elevated priviledges?
most display managers (except gdm) do.

Ubuntu here. So safe.

>recommend fedora to grandparents
>pap pap never has to worry about x zero days
>he loves the big gnome icons because his eyesight is bad
>his porn plays smoothly with no screen tearing
mission accomplished