Only if you enable the mode for rootless containers. If you run more safe, this thing is apparently impotent.
No containers here, no cry.
This is a most excellent place for technology news and articles.
Only if you enable the mode for rootless containers. If you run more safe, this thing is apparently impotent.
No containers here, no cry.
Where are you getting that from? That's not the case at all.
Hmm seems like that report is AI generated
It is. The vuln itself was found with guidance of an AI tool. Doesn’t make the vuln any less bad. Does make Xint look really shitty for constantly shilling with boilerplate AI instead of a good human analysis (or at least something above boilerplate).
It feels weird that it has it's own domain name and slogan. I get that there's a promotional aspect to it, but it seems a bit much.
This is not uncommon for high-profile CVEs. For example, brokenwire.fail, heartbleed.com, spectreattack.com, etc..
They had a month to set it up.
Ugh, another new "sudo" clone.
They rolled their own ~~encryption~~ sudo.
Much smaller than sudo
surprise new linux feature: Much more space-efficient sudo command
... 'cause I always keep forgetting my password.
I am curious to see if/how this'll open up some android devices.
My brain was too moosh for the technical reading, but I saw GrapheneOS say they're immune to it. So probably not good for regular Android, lol.
In the writeup, they say there's multiple other vulnerabilities on this attack surface, but they're still working on responsible disclosure.