140
submitted 1 year ago by zquestz@lemm.ee to c/linux@lemmy.ml
all 14 comments
sorted by: hot top controversial new old

What the fuck is this picture though? Who is taking these? What do they mean?

[-] Ansis@iusearchlinux.fyi 37 points 1 year ago

I don't have answers but I love this one. They're usually pretty dumb, like a wrench on a motherboard or something. This one is actually funny with no intent on being serious.

[-] remotelove@lemmy.ca 23 points 1 year ago

You don't open your beer on a CPU socket? It's like when you use your teeth: It's all about the leverage.

[-] 601error@lemmy.ca 4 points 1 year ago

Well, I don’t, because mine is for ripping threads. Use the right tool for the job.

[-] Blizzard@lemmy.zip 3 points 1 year ago

It's a clickbait.

[-] Zion@lemmy.world 2 points 1 year ago

I thought you were joking until I clicked the link.

[-] XTornado@lemmy.ml 1 points 1 year ago* (last edited 1 year ago)

In past it was a symbol of being rich, nowadays you have to use an Nvidia or bust.

[-] crazyminner@sh.itjust.works 24 points 1 year ago

What the hell is with all these vulnerabilities lately. Did the US govt toolbox get leaked or something? Are people using AI to find these?

There's been so many in just the last month.

[-] Laser@feddit.de 19 points 1 year ago

An interesting fact about the affected versions: It was introduced in 2.34, so there was a comment on hackernews that Red Hat 8 isn't affected because it ships with an earlier version. However, from Red Hat's customer Portal:

Statement

This vulnerability was introduced in glibc 2.34 in commit 2ed18c. The commit that introduced the vulnerability was backported to RHEL-8.6 and is affected.

So just checking version numbers for vulnerabilities isn't really enough. I had a similar discussion at work lately where a CVE fix was listed in a stable kernel's changelog even though going by the vulnerable versions listed in the CVE itself, that kernel wasn't affected.

[-] loki@lemmy.ml 5 points 1 year ago

So if RHEL is affected, it means Rocky and AlmaLinux is too.

[-] autotldr@lemmings.world 14 points 1 year ago

This is the best summary I could come up with:


A nasty vulnerability has been made public today concerning Glibc's dynamic loader that can lead to full root privileges being obtained by local users.

This affects Linux distributions of the past two years with the likes of Ubuntu 22.04 LTS, 23.04, Fedora 38, and others vulnerable to this local privilege escalation issue.

Qualys announced this vulnerability a few minutes ago: "The GNU C Library's dynamic loader "find[s] and load[s] the shared objects (shared libraries) needed by a program, prepare[s] the program to run, and then run[s] it" (man ld.so).

Recently, we discovered a vulnerability (a buffer overflow) in the dynamic loader's processing of the GLIBC_TUNABLES environment variable.

This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c ("Fix SXID_ERASE behavior in setuid programs (BZ #27471)").

In the interim we are already seeing actions take place such as Debian temporarily restricting access to some of their systems until they are patched against this local privilege escalation vulnerability.


The original article contains 351 words, the summary contains 158 words. Saved 55%. I'm a bot and I'm open source!

this post was submitted on 04 Oct 2023
140 points (95.5% liked)

Linux

48758 readers
1228 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS