- cross-posted to:
- linux@programming.dev
- cross-posted to:
- linux@programming.dev
Correct me if I’m wrong but isn’t that just PAM being PAM?
It feels like a terrible horrible no good bad month for Linux :(
Really?
I thought it’s great, since those exploits didn’t just come from thin air. It would be bad if someone got their hands on a zero-day and managed to do something catastrophic, like shutting down airports, or blowing up a power plant.
Also, it’s not like they’re losing money over this.
These kind of exploits have always been common. The only thing that changed is people talking about them.
I fell it’s going to be a bad couple of months for everybody, not just Linux. It’s just with open source, it’s easier for the LLMs to find things that have been missed. And more open when they do because you can see the bug reports.
On the bright side though I think security is an afterthought and it needs to be the default on internet facing software.
That a hacker hasn’t bothered to look except the lowest hanging sql injections isn’t enough.
And, I know vibe coding gets a deserved bad rap, but you can ask an AI to test out your security or point out obvious holes you might not know to look for.
How is this a backdoor if it requires being able to install custom PAM modules???
First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.
It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.
How many of these security news stories are largely exaggerated by Redmond and its affiliated outlets?
The last couple were pretty serious. Just because local privilege escalations are pretty common doesn’t mean they aren’t bad.
I think it’s best to read the actual docs published by the research when available. News tells some, but I have seen it sensationalized a few times, where it only affects x kernel with y module before update z.
That being said, these are seemingly getting more and more frequent as previously noted.
If it was backdoor that means someone created it maliciously or it is bug?
It is a tool to establish persistente after the server is already hacked. This isn’t a way to break into a server.







