• 1 Post
  • 12 Comments
Joined 3 years ago
cake
Cake day: August 9th, 2023

help-circle


  • A naive attacker will leave log entries and other traceable things behind but an experienced attacker who has gained root permissions can clean up behind themselves very quickly. So yes it’s traceable but in practice it can be hard to find evidence.

    There is a lot of concern for situations like you describe but in practice generic users have many paths to privilege escalation if they choose to try. You should either never let untrusted users have access to your systems or take special precautions anyway.

    This exploit was notable for it’s ease of use and that it was announced before a patch was released leaving a window of vulnerability. But OS maintainers are on top of things, my debian servers have already rebooted this morning with the mitigation. So overall not too bad as these things go.