• hygieia@feddit.nl
    link
    fedilink
    arrow-up
    101
    ·
    11 months ago

    CVE-2023-2640 and CVE-2023-32629 if you don’t fancy spending an age clicking Object to all the ‘legitimate interest’ cookie shit.

    • maiskanzler@feddit.de
      link
      fedilink
      arrow-up
      4
      arrow-down
      5
      ·
      11 months ago

      Tip: “I still don’t care about cookies” for desktop browsers + deleting all cookies at the end of the browser session works flawlessly for me.

  • Yewb@kbin.social
    link
    fedilink
    arrow-up
    31
    ·
    11 months ago

    CVE-2023-2640

    Needs a user account on the system (even unprivledged accounts) via overlayfs

    Overlayfs allows one, usually read-write, directory tree to be overlaid onto another, read-only directory tree. All modifications go to the upper, writable layer. This type of mechanism is most often used for live CDs but there is a wide variety of other uses.

  • BadRS@lemmy.world
    link
    fedilink
    arrow-up
    21
    arrow-down
    1
    ·
    11 months ago

    Is the end of this headline “because they haven’t updated in 3 years”?

    • style99@kbin.social
      link
      fedilink
      arrow-up
      13
      ·
      11 months ago

      In this case, it’s more like the opposite. People testing the cutting edge versions of Ubuntu are the ones impacted.

  • astraeus@programming.dev
    link
    fedilink
    arrow-up
    13
    ·
    11 months ago

    Couldn’t find whether this even impacts LTS builds. Either way, seems like patching should resolve the issue

  • Roq@noc.social
    link
    fedilink
    arrow-up
    8
    ·
    11 months ago

    @leo what’s the solution, is it just the normal apt update/upgrade or something more complicated? And is it possible to know if a machine has suffered such attack at all?

  • Yewb@kbin.social
    link
    fedilink
    arrow-up
    8
    arrow-down
    1
    ·
    11 months ago

    Needs a user account on the system (even unprivledged accounts) via overlayfs

    Overlayfs allows one, usually read-write, directory tree to be overlaid onto another, read-only directory tree. All modifications go to the upper, writable layer. This type of mechanism is most often used for live CDs but there is a wide variety of other uses.