Post A9UFLXgoTgD58e32Js by anahata@tech.lgbt
 (DIR) More posts by anahata@tech.lgbt
 (DIR) Post #A9U3aoGjv2atS7MkU4 by ParadeGrotesque@mastodon.sdf.org
       2021-07-20T15:13:14Z
       
       0 likes, 0 repeats
       
       - CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer- CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)CVE-2021-33909 is full root access on a number of Linux distributions. Fun fun fun.
       
 (DIR) Post #A9U3pb55EZ8StVxt7w by ParadeGrotesque@mastodon.sdf.org
       2021-07-20T15:15:53Z
       
       0 likes, 0 repeats
       
       Here is the long and detailed write up by Qualys:https://seclists.org/oss-sec/2021/q3/19
       
 (DIR) Post #A9UCPJcaQPksnpB8Ay by cs@mastodon.sdf.org
       2021-07-20T16:51:58Z
       
       0 likes, 0 repeats
       
       @ParadeGrotesque am I correct in read/understanding that this would be done with a non-root account with malicious intent and that it is not exploitable remotely by a non-user?
       
 (DIR) Post #A9UFLXgoTgD58e32Js by anahata@tech.lgbt
       2021-07-20T17:24:56Z
       
       0 likes, 0 repeats
       
       @ParadeGrotesque So it's 1999 / 2000 again in Linux land? yay!
       
 (DIR) Post #A9UUYHoEKY6sxn3Hm4 by ParadeGrotesque@mastodon.sdf.org
       2021-07-20T20:15:17Z
       
       0 likes, 0 repeats
       
       @cs That's my understanding as well.
       
 (DIR) Post #A9UV02gy83tEBdtHtI by hans_w@federate.hopto.org
       2021-07-20T20:20:13Z
       
       0 likes, 0 repeats
       
       As you might know it will probably be part of what users are allowed to do on a system. I do think they are able to mount it by simply inserting an usb stick and mounting it as a user in /home/user/bladiebladieblaidie .....