

This is nice! Thanks for sharing. I’ve got a surface pro I’ve been meaning to convert to Linux and this looks like a good way to go!


This is nice! Thanks for sharing. I’ve got a surface pro I’ve been meaning to convert to Linux and this looks like a good way to go!


A naive attacker will leave log entries and other traceable things behind but an experienced attacker who has gained root permissions can clean up behind themselves very quickly. So yes it’s traceable but in practice it can be hard to find evidence.
There is a lot of concern for situations like you describe but in practice generic users have many paths to privilege escalation if they choose to try. You should either never let untrusted users have access to your systems or take special precautions anyway.
This exploit was notable for it’s ease of use and that it was announced before a patch was released leaving a window of vulnerability. But OS maintainers are on top of things, my debian servers have already rebooted this morning with the mitigation. So overall not too bad as these things go.
Hopefully we’ll vote better.


I work in this space and have not seen any claims of remote exploitation. The attacker needs access to a generic user account on the system in order to use the exploit.


Good news everyone!
Alright there Brenda 🤔


Let’s go, my wife and I are participating. Don’t expect crazy numbers but we gotta start somewhere


Nice find! Thanks for sharing


Keep em frosty people
Why is this still so funny
Very good news!