ryuko@lemmy.mltoOpen Source@lemmy.ml•The NZ government is requiring use of proprietary software to do our important tests.English
0·
1 year agoIs it possible to get around this with user agent spoofing? Or maybe degoogled Chromium?
not a weeb
trans rights 🏳️⚧️🏳️🌈
they/them
Is it possible to get around this with user agent spoofing? Or maybe degoogled Chromium?
That’s a really interesting bypass; I wonder how this can be patched or mitigated considering the module is entirely loaded from memory. Short of setting noexec
on temporary directories, I can’t think of any quick short term fixes.
Edit: Re-read the blog post and looked at the Github repo for the code- looks like this is more of a proof of concept of a SELinux confine bypass, as the kernel needs to be compiled with CONFIG_SECURITY_SELINUX_DEVELOP
set. See the readme here, there’s some more notes that weren’t included in the blog post.
Mine isn’t very interesting, but sure