<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=4424&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / It's not just Wondows: apparently we have a problem]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=4424</link>
		<description><![CDATA[The most recent posts in It's not just Wondows: apparently we have a problem.]]></description>
		<lastBuildDate>Fri, 23 Jul 2021 07:12:37 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30820#p30820</link>
			<description><![CDATA[<div class="quotebox"><cite>zapper wrote:</cite><blockquote><div><p>I really hope they don&#039;t have to go that far down just to learn a simple lesson.</p></div></blockquote></div><p>TBH I don&#039;t think anyone is learning anything, at least as far as systemd development is concerned. <br />The katamari must roll on after all, how else are the devs going to keep their KPIs up?</p><p>I mean, everyone likes shiny new shit (especially shareholders and corporate sponsors), and we can just patch the bugs later, right? <img src="https://dev1galaxy.org/img/smilies/roll.png" width="15" height="15" alt="roll" /></p><p>Hell, in this day and age you don&#039;t even need a competent sysadmin (or distro maintainer) to test and deploy patches, you just sign up to Kaseya for all your cloud-based <del>update</del> ransomware management goodness...</p><p>All of this reminds me of a rather old adage, IIRC it had some wise words regarding eggs and baskets.</p>]]></description>
			<author><![CDATA[dummy@example.com (steve_v)]]></author>
			<pubDate>Fri, 23 Jul 2021 07:12:37 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30820#p30820</guid>
		</item>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30818#p30818</link>
			<description><![CDATA[<div class="quotebox"><cite>steve_v wrote:</cite><blockquote><div><div class="quotebox"><cite>andyprough wrote:</cite><blockquote><div><p>Moral of the story - don&#039;t give rogue users direct access to your system.</p></div></blockquote></div><p>...And if you must give untrusted users a shell, at least put sane limits on the system resources they can consume. There aren&#039;t many legitimate reasons an untrusted user process needs 5GB of RAM and a million inodes.</p><div class="quotebox"><cite>Dutch_Master wrote:</cite><blockquote><div><p>systemd</p></div></blockquote></div><p>Funny you should mention that, as there&#039;s an example of the inevitable consequences of running such a large codebase as PID1 <a href="https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/cve-2021-33910-denial-of-service-stack-exhaustion-in-systemd-pid-1" rel="nofollow">linked</a> in that same Reg article.</p><p>Remember how us old-school *nix nerds said PID1 should be as simple as possible, since a crash there will bring the whole system down?</p><p>In some 20+ years I have never seen nor heard tell of an unprivileged process crashing sysv init, yet here we are <em>again</em> with systemd. <br />This one was at least patched quickly, but the core design fault isn&#039;t going away - on the contrary, systemd is getting fatter with every release and the potential attack surface just keeps on growing.</p></div></blockquote></div><p>Maybe then at some point, they will actually learn their lesson if a bad enough crash happens... </p><p>Although, that would be pretty damn frightening, so I really hope they don&#039;t have to go that far down just to learn a simple lesson.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Fri, 23 Jul 2021 03:08:34 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30818#p30818</guid>
		</item>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30800#p30800</link>
			<description><![CDATA[<div class="quotebox"><cite>andyprough wrote:</cite><blockquote><div><p>Moral of the story - don&#039;t give rogue users direct access to your system.</p></div></blockquote></div><p>...And if you must give untrusted users a shell, at least put sane limits on the system resources they can consume. There aren&#039;t many legitimate reasons an untrusted user process needs 5GB of RAM and a million inodes.</p><div class="quotebox"><cite>Dutch_Master wrote:</cite><blockquote><div><p>systemd</p></div></blockquote></div><p>Funny you should mention that, as there&#039;s an example of the inevitable consequences of running such a large codebase as PID1 <a href="https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/cve-2021-33910-denial-of-service-stack-exhaustion-in-systemd-pid-1" rel="nofollow">linked</a> in that same Reg article.</p><p>Remember how us old-school *nix nerds said PID1 should be as simple as possible, since a crash there will bring the whole system down?</p><p>In some 20+ years I have never seen nor heard tell of an unprivileged process crashing sysv init, yet here we are <em>again</em> with systemd. <br />This one was at least patched quickly, but the core design fault isn&#039;t going away - on the contrary, systemd is getting fatter with every release and the potential attack surface just keeps on growing.</p>]]></description>
			<author><![CDATA[dummy@example.com (steve_v)]]></author>
			<pubDate>Thu, 22 Jul 2021 04:47:46 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30800#p30800</guid>
		</item>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30791#p30791</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>Dutch_Master wrote:</cite><blockquote><div><p>... including using systemd as default init system <img src="https://dev1galaxy.org/img/smilies/tongue.png" width="15" height="15" alt="tongue" /></p></div></blockquote></div><p>Indeed.</p><p>I <em>was</em> being facetious, I seriously doubt they will backpedal on this.</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Wed, 21 Jul 2021 19:20:28 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30791#p30791</guid>
		</item>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30789#p30789</link>
			<description><![CDATA[<div class="quotebox"><cite>Altoid wrote:</cite><blockquote><div><p>Maybe they should weigh the risk again?</p></div></blockquote></div><p>They should, including using systemd as default init system <img src="https://dev1galaxy.org/img/smilies/tongue.png" width="15" height="15" alt="tongue" /></p>]]></description>
			<author><![CDATA[dummy@example.com (Dutch_Master)]]></author>
			<pubDate>Wed, 21 Jul 2021 18:55:07 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30789#p30789</guid>
		</item>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30788#p30788</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>... local vulnerability so unlikely to trouble most desktop users.</p></div></blockquote></div><p>Good to know.</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>... exploitable in Debian 11 ... <br />... user namespaces have been enabled by default:<br />Bad decision...</p></div></blockquote></div><p>Yes, I agree.</p><div class="quotebox"><blockquote><div><p>... Debian default was to restrict this feature to processes running as root, because it exposed more security issues in the kernel.<br />... confident that the risk of enabling it is outweighed by the security benefits ...<br /><a href="https://security-tracker.debian.org/tracker/CVE-2021-33909" rel="nofollow">https://security-tracker.debian.org/tra … 2021-33909</a></p></div></blockquote></div><p>Maybe they should weigh the risk again?</p><p>Thank for your input.</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Wed, 21 Jul 2021 18:50:28 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30788#p30788</guid>
		</item>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30784#p30784</link>
			<description><![CDATA[<p>It&#039;s a local vulnerability so unlikely to trouble most desktop users. But it is exploitable in Debian 11 (and hence Devuan chimaera) because user namespaces have been enabled by default:</p><p><a href="https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#linux-user-namespaces" rel="nofollow">https://www.debian.org/releases/bullsey … namespaces</a></p><p>Bad decision...</p><p>EDIT:</p><p><a href="https://security-tracker.debian.org/tracker/CVE-2021-33909" rel="nofollow">https://security-tracker.debian.org/tra … 2021-33909</a></p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Wed, 21 Jul 2021 17:04:28 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30784#p30784</guid>
		</item>
		<item>
			<title><![CDATA[Re: It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30780#p30780</link>
			<description><![CDATA[<p>Moral of the story - don&#039;t give rogue users direct access to your system. That is a &quot;bad&quot; thing.</p>]]></description>
			<author><![CDATA[dummy@example.com (andyprough)]]></author>
			<pubDate>Wed, 21 Jul 2021 13:33:42 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30780#p30780</guid>
		</item>
		<item>
			<title><![CDATA[It's not just Wondows: apparently we have a problem]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=30777#p30777</link>
			<description><![CDATA[<p>Hello:</p><p>From this morning&#039;s edition of ElReg:</p><p><a href="https://www.theregister.com/2021/07/21/windows_linux_privilege_escalation/" rel="nofollow">https://www.theregister.com/2021/07/21/ … scalation/</a></p><div class="quotebox"><cite>Richard Speed wrote:</cite><blockquote><div><p>It&#039;s not just Windows: a security hole has been discovered in Linux kernels since version 3.16 that can be exploited by rogue users and malware already on a system to gain root-level privileges. The vulnerability has been assigned the ID CVE-2021-33909.</p><p>Dubbed Sequoia by the Qualys team that found and responsibly reported the flaw, we&#039;re told the bug is present in &quot;default installations of Ubuntu 20.04, Ubuntu 20.10, Ubuntu 21.04, Debian 11, and Fedora 34 Workstation. Other Linux distributions are likely vulnerable and probably exploitable.&quot; Thus, check for updates and install them as soon as you can as patches should be available by now now or shortly for your distro.</p><p>Technical details of the file-system-code-level programming blunder are here. Qualys&#039; proof-of-concept exploit required 5GB of RAM and a million inodes to succeed.</p><p>Qualys also found another security weakness in Linux systems, CVE-2021-33910, a denial-of-service kernel panic via systemd. Patches are also available so grab those updates, too.</p></div></blockquote></div><p>I don&#039;t know how high the possibilities of this being executed are, but I thought I&#039;d point to it for those who know more about these things.</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Wed, 21 Jul 2021 12:04:23 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=30777#p30777</guid>
		</item>
	</channel>
</rss>
