Post A9UFLXgoTgD58e32Js by anahata@tech.lgbt
(DIR) More posts by anahata@tech.lgbt
(DIR) Post #A9U3aoGjv2atS7MkU4 by ParadeGrotesque@mastodon.sdf.org
2021-07-20T15:13:14Z
0 likes, 0 repeats
- CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer- CVE-2021-33910: Denial of service (stack exhaustion) in systemd (PID 1)CVE-2021-33909 is full root access on a number of Linux distributions. Fun fun fun.
(DIR) Post #A9U3pb55EZ8StVxt7w by ParadeGrotesque@mastodon.sdf.org
2021-07-20T15:15:53Z
0 likes, 0 repeats
Here is the long and detailed write up by Qualys:https://seclists.org/oss-sec/2021/q3/19
(DIR) Post #A9UCPJcaQPksnpB8Ay by cs@mastodon.sdf.org
2021-07-20T16:51:58Z
0 likes, 0 repeats
@ParadeGrotesque am I correct in read/understanding that this would be done with a non-root account with malicious intent and that it is not exploitable remotely by a non-user?
(DIR) Post #A9UFLXgoTgD58e32Js by anahata@tech.lgbt
2021-07-20T17:24:56Z
0 likes, 0 repeats
@ParadeGrotesque So it's 1999 / 2000 again in Linux land? yay!
(DIR) Post #A9UUYHoEKY6sxn3Hm4 by ParadeGrotesque@mastodon.sdf.org
2021-07-20T20:15:17Z
0 likes, 0 repeats
@cs That's my understanding as well.
(DIR) Post #A9UV02gy83tEBdtHtI by hans_w@federate.hopto.org
2021-07-20T20:20:13Z
0 likes, 0 repeats
As you might know it will probably be part of what users are allowed to do on a system. I do think they are able to mount it by simply inserting an usb stick and mounting it as a user in /home/user/bladiebladieblaidie .....