For the general awareness of other Linux hosts. Verified it as an valid on my Debian host: [goose@Vergil: ~/test ] $ uname -a Linux Vergil.goose.ws 6.18.15+deb13-amd64 #1 SMP PREEMPT_DYNAMIC...
For the general awareness of other Linux hosts. Verified it as an valid on my Debian host:
Some good news, the fix proposed in the repo (blacklist the relevant modules): sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' >...
Some good news, the fix proposed in the repo (blacklist the relevant modules):
Additionally, and fortunately, I'm unable to exploit this from inside a (Docker) container. Not to say that it can't be done, but my Docker is fairly default, and (appears to be) not vulnerable:
I saw this a couple places, but I have questions--I thought copyfail requied local access. I read that this is basically like copyfail, so as a home user with nearly zero chance of a local machine...
I saw this a couple places, but I have questions--I thought copyfail requied local access. I read that this is basically like copyfail, so as a home user with nearly zero chance of a local machine takeover, can I just wait for an offical patch? I also read that the posted mitigation breaks IPSec, which seems problematic.
Yes and no. Your attack surface is reduced, but depending on what services you may have that interface externally (web apps), the low level user space access those use could be a route for the...
Yes and no. Your attack surface is reduced, but depending on what services you may have that interface externally (web apps), the low level user space access those use could be a route for the exploit.
For the general awareness of other Linux hosts. Verified it as an valid on my Debian host:
Some good news, the fix proposed in the repo (blacklist the relevant modules):
Does seem to patch it for me:
Additionally, and fortunately, I'm unable to exploit this from inside a (Docker) container. Not to say that it can't be done, but my Docker is fairly default, and (appears to be) not vulnerable:
I saw this a couple places, but I have questions--I thought copyfail requied local access. I read that this is basically like copyfail, so as a home user with nearly zero chance of a local machine takeover, can I just wait for an offical patch? I also read that the posted mitigation breaks IPSec, which seems problematic.
Yes and no. Your attack surface is reduced, but depending on what services you may have that interface externally (web apps), the low level user space access those use could be a route for the exploit.
Ah, thanks for the explanation!