- Joined
- Apr 1, 2024
Yeah. This is part of the "other stuff" I was talking about when I mentioned security people criticize about Linux, when I mentioned that the xorg security thing is a problem.Yeah, to be honest a lot of Linux security is just the fact that nobody bothers to target it. There's very little oversight for package maintainers, for example, since nobody wants to maintain packages in the first place much less check every single thing that's uploaded.
for a simplistic proof of concept:
Add PATH=$HOME/.local/bin:$PATH to the end of your .bashrc
Code:#!/bin/bash /usr/bin/sudo echo 'lol'
Name this sudo, make it executable, put it in ~/.local/bin
Close and reopen your terminal, run sudo apt update or sudo dnf update or sudo pacman -Syu or whatever you usually do to update your system. Now imagine this pointed to a malicious binary instead.
There are other tricks you can do with stuff like LD_PRELOAD
It's a an easy place to attack, that doesn't require some crazy exploit or some sophisticated attack, it's just a wide open vulnerability. So your whole machine doesn't need to be compromised for an attacker to take advantage of the xorg issue.
How likely is it? Idk depends on the user, and what they do. But it's better that it get's dealt with, rather than people brushing it off, like it doesn't matter. Or at least acknowledge it's there to watch out for it.
Just like the attacks that take advantage of the shell and libraries. For me, I've taken to trying to sandbox things where I can. To at least stop a super simple exploit like that if I somehow manage to run into it.
But the best security is the user in a lot of cases.
RIP Nigger. LolHow to use Ubuntu? I'm retarded in anything to do with IT
Last edited by a moderator:
