Microsoft’s Nimbuspwn sets the Linux security media ablaze but where there’s smoke there’s not always fire, plus we bring you the first part of a 2 part series looking at some of the security features in the latest Ubuntu 22.04 LTS release.
92 unique CVEs addressed
networkd-dispatcher
which could be used
to get RCE
systemd-network
user (since this user is the only one which can bind
to the right dbus name org.freedesktop.network1
)apt=/=apt-get
during package install /
upgrade so this sounds like a common scenario that would affect most
users (instead of say epmd which is the erlang port mapper daemon, so
unless you are running erland applications you would not be affected by
that)systemd-network
user - this is definitely not the case for standard Ubuntu - since apt
is
very clear to run them under the _apt
user account purposefully to
restrict their privilegesnetworkd-dispatcher
since
they are not able to be exploited in standard configurations they are not
a real threat to most usersnetworkd-dispatcher
but didn’t involve any downstream
distros - as suggested by Julian Andres Klode from the Ubuntu Foundations
team (and upstream apt maintainer) - perhaps Microsoft should have
pre-disclosed this issue to the linux-distros mailing list - if they had
done so this likely would have been assessed and clarified earlier so
that Microsoft could have more properly understood the extent of the
vulnerabilities which they discovered the internet could have avoided
another brief panic scenario