Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)NK
Posts
9
Comments
5
Joined
2 yr. ago
@linux on Linux.Community @linux.community
nkukard @linux.community

Firefox changes their TOS

"When you upload or input information through Firefox, you hereby grant us a nonexclusive, royalty-free, worldwide license to use that information to help you navigate, experience, and interact with online content as you indicate with your use of Firefox."

@linux on Linux.Community @linux.community
nkukard @linux.community

CachyOS February 2024 Release

@linux on Linux.Community @linux.community
nkukard @linux.community

Take note of the quote in the article...


OP/bug finder here with some clarifying information. It's a common misconception that this issue can only be abused if you use HTTP boot. That is not the case at all, otherwise it wouldn't be Critical. This bug can be abused locally (privileged malware can overwrite the EFI partition), from an adjacent network if PXE boot is enabled (w/ MiTM), or remotely if HTTP boot is used (w/ MiTM).

More details on these scenarios:

  1. A remote attacker with no privileges in a man-in-the-middle (MitM) position could leverage the issue against a victim machine that uses HTTP boot. No direct access to the victim machine is required.
  2. A remote attacker with privileges and code execution on the victim machine could leverage the issue to bypass Secure Boot, even if the victim does not already use HTTP boot (as long as firmware has HTTP support). How? Several ways:
  • An attacker can edit the boot order variable to specify a controlled attacker server.
@linux on Linux.Community @linux.community
nkukard @linux.community

Plasma 6 Release Candidate 1 has landed.

cross-posted from: https://floss.social/users/kde/statuses/111732458987994100

Plasma 6 Release Candidate 1 has landed.

We are less than 50 days away from the final version of #Plasma6.

Along with Frameworks 6 and KDE Gear 24.02, the Megarelaease on the 28th of February will be one of the biggest and more complex upgrades in KDE's history.

One more RC will be released on the 31st of January and then it will be (hopefully) clear sailing until the final release.

https://kde.org/announcements/megarelease/6/rc1/

@[email protected]

@linux on Linux.Community @linux.community
nkukard @linux.community

Fresh curl tomorrow will patch 'worst' security flaw in ages | TheRegister

"Curl 8.4.0 will hit at around 0600 UTC (0800 CEST, 0700 BST, 0200 EST, 2300 PDT) on October 11 and deal with CVE-2023-38545, which affects both libcurl and the curl tool, and CVE-2023-38546, which only affects libcurl...."

  • Has anyone tried the POC's for this on their systems? Just curious as to your success rate. I've been running 3 slightly difference POC's for the past 4 days and I'm still yet to drop to root on any of the 3 systems I'm trying on.

  • @linux on Linux.Community @linux.community
    nkukard @linux.community
    @linux on Linux.Community @linux.community
    nkukard @linux.community

    "Remote code execution requiring no authentication fixed. 2 other RCEs remain unpatched...."

    @linux on Linux.Community @linux.community
    nkukard @linux.community

    "On September 28, 2023, the Snap Store team was notified of a potential security incident. A number of snap users reported several recently published and potentially malicious snaps...."

    @linux on Linux.Community @linux.community
    nkukard @linux.community

    CVE-2023-38408: REMOTE CODE EXECUTION IN OPENSSH'S FORWARDED SSH-AGENT