| ▲ | SoftTalker 6 hours ago | ||||||||||||||||
It's a local vulnerability at least. How many people do you let log in to your router? With the way linux is used these days, I'd guess the number of systems with untrusted local users is pretty limited. Even with shared hosting, you generally have root in your VM or container anyway. Unless this enables an escape from that? Still the risk that people who run "curl | bash" without care could get bitten, but usually its "curl | sudo bash" anyway... | |||||||||||||||||
| ▲ | sgbeal 6 hours ago | parent | next [-] | ||||||||||||||||
> Even with shared hosting, you generally have root in your VM or container Lots of shared hosters don't use VMs or containers. It's some arbitrary number of people logging in to a shared system, each one with a home directory under /home/THE_USER_NAME. i've had several such hosters over the years (thankfully not right now, though). | |||||||||||||||||
| ▲ | sjpb 5 hours ago | parent | prev | next [-] | ||||||||||||||||
> With the way linux is used these days, I'd guess the number of systems with untrusted local users is pretty limited Things like HPC clusters are multiuser & don't entirely trust their users. If they did we wouldn't need users/groups/permissions etc in the first place. | |||||||||||||||||
| |||||||||||||||||
| ▲ | dist-epoch 6 hours ago | parent | prev | next [-] | ||||||||||||||||
With this exploit it's trivial to jump from one container to another neighbor container. I've tried it and succeeded. So containers don't protect you, only a VM. | |||||||||||||||||
| |||||||||||||||||
| ▲ | michaelmrose 6 hours ago | parent | prev [-] | ||||||||||||||||
Local root is part of the path to escaping | |||||||||||||||||