• NekkoDroid@programming.dev
    link
    fedilink
    arrow-up
    31
    arrow-down
    10
    ·
    edit-2
    7 months ago

    This isn’t exactly a “new” attack surface, so removing the attack surface that sudo (and alternatives) is, is probably a net positive.

    • jkrtn@lemmy.ml
      link
      fedilink
      arrow-up
      10
      arrow-down
      2
      ·
      7 months ago

      That attack surface is not vanishing. It’s would be relocating the same attack surface to something that might have an xz library in memory.

      • NekkoDroid@programming.dev
        link
        fedilink
        arrow-up
        4
        arrow-down
        1
        ·
        7 months ago
        1. The attack surface is there either way, this is just functionality repackaged that existed already before (systemd-run, which is calling into PID1)
        2. all compression libraries (actually most libraries at this point) are dlopened on demand (which was planned even before the attack, which is speculated that the attack was accelerated in timeline because he was on a timer before the change was released)