#YachaBlog
125 subscribers
470 photos
108 videos
14 files
126 links
Download Telegram
I'm sorry
On plasma apparently you can move trash into trash
😁5
😁3😢2
Forwarded from Krista.vrml
🔥4😁2
This week in openSUSE every distro mailing list
😁2🔥1
Forwarded from Saki Skullfield
YES I WORK IN ONLY FANS
Forwarded from ㅤUndi Snökatt - (that squeaky cat!) ^.ᆽ.^= ∫ ㅤㅤㅤ
This media is not supported in your browser
VIEW IN TELEGRAM
😁2
Rock stable XFCE guyzzz and the button "Don't show this mess"
😁3
Forwarded from yachu
I wanted to post something silly but have nothing, so might y'all post something this time.
😁4
If you use podman or buildah, here's the critical CVE
https://bugzilla.redhat.com/show_bug.cgi?id=2265513

It allows a full container escape on the build stage.
It shouldn't affect running containers.
Also if you use SELinux (please tell me that you do), it'll be limited to R/O.
I'm sorry but apparently Red Hat started working the new NVIDIA driver written by Rust, just like a few months after NVIDIA partially open-sourced its own driver.
Right now we already have 3 NVIDIA variants:
1. noveau - part of Linux kernel, open-source
2. propriety nvidia
3. open nvidia

We might have one more for no reason.

https://lists.freedesktop.org/archives/dri-devel/2024-March/446709.html

I'm not going to comment this as I'm not quite sure what my position about this is. I kinda see both positive and negative sides of this.
Another shit news is that Redis is going to the proprietary license. That means that it'll be soon removed from all sane distros. openSUSE already discussing this in their mailing list.
Mostly likely, we'll gonna have a fork of Redis.
I finally self hosted one of those shiny alternatives to google photos
🔥2
What else should I self host uhhh ohh
🤡1
https://www.zerodayinitiative.com/blog/2024/3/21/pwn2own-vancouver-2024-day-two-results

You might like to scroll this one, but I want to highlight an Ubuntu case.
STAR Labs SG was able to escalate permissions from a regular user to root.

As well as the Docker container escape case. By default Docker uses root deamon, so you don't even need to use the vulnerability I mentioned below.

Once again I urge to not use Ubuntu and use more secure distros with more advanced security protection like SELinux.
Use podman and rootless containers instead of Docker, this way by escaping containers you get only user permissions and ideally still restricted by SELinux policy which allows only r/o access by default.