ryuko

joined 1 year ago
 

I only joined the main Lemmy instance a couple of days ago, but browing by new, there's a pretty consistent stream of new posts now, even compared to the first day I was on here. I'm excited for this community.

[–] ryuko@lemmy.ml 0 points 1 year ago

Mine isn't very interesting, but sure

 
[–] ryuko@lemmy.ml 0 points 1 year ago (3 children)

Is it possible to get around this with user agent spoofing? Or maybe degoogled Chromium?

[–] ryuko@lemmy.ml 0 points 1 year ago* (last edited 1 year ago) (1 children)

That's a really interesting bypass; I wonder how this can be patched or mitigated considering the module is entirely loaded from memory. Short of setting noexec on temporary directories, I can't think of any quick short term fixes.

Edit: Re-read the blog post and looked at the Github repo for the code- looks like this is more of a proof of concept of a SELinux confine bypass, as the kernel needs to be compiled with CONFIG_SECURITY_SELINUX_DEVELOP set. See the readme here, there's some more notes that weren't included in the blog post.