You are not logged in.
I've just been reading about the Shikitega malware. I must admit I don't understand it all so just would like to hear opinions on it.
Is this severe? And how do we protect against it. There are already recommended actions on the site but any more suggestions are of course helpful.
Offline
That piece of malware relies on two different exploits. One of them has already been fixed...
https://security.archlinux.org/CVE-2021-4034
and the other only applies to a Ubuntu patched kernel...
https://cve.mitre.org/cgi-bin/cvename.c … -2021-3493
I'd say there's nothing to worry about.
Offline
Looking at the article, during the first 2 stages it only needs user rights.
The vulnerabilities to elevate to root make the 3rd stage possible.
Assuming an archlinux system is fully uptodate , this malware could enter the system but not do much harm.
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
Ok, thanks for the thoughts.
Offline