Microsoft’s Nimbuspwn sets the Linux security media ablaze but where there’s smoke there’s not always fire, plus we bring you the first part of a 2 part series looking at some of the security features in the latest Ubuntu 22.04 LTS release.
92 unique CVEs addressed
networkd-dispatcher which could be used
to get RCE
systemd-network user (since this user is the only one which can bind
to the right dbus name org.freedesktop.network1)apt=/=apt-get during package install /
upgrade so this sounds like a common scenario that would affect most
users (instead of say epmd which is the erlang port mapper daemon, so
unless you are running erland applications you would not be affected by
that)systemd-network
user - this is definitely not the case for standard Ubuntu - since apt is
very clear to run them under the _apt user account purposefully to
restrict their privilegesnetworkd-dispatcher since
they are not able to be exploited in standard configurations they are not
a real threat to most usersnetworkd-dispatcher but didn’t involve any downstream
distros - as suggested by Julian Andres Klode from the Ubuntu Foundations
team (and upstream apt maintainer) - perhaps Microsoft should have
pre-disclosed this issue to the linux-distros mailing list - if they had
done so this likely would have been assessed and clarified earlier so
that Microsoft could have more properly understood the extent of the
vulnerabilities which they discovered the internet could have avoided
another brief panic scenario