GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    Sandra (sandra@idiomdrottning.org)'s status on Sunday, 31-Mar-2024 18:37:20 JSTSandraSandra

    This is wrong:

    Using systemd on publicly accessible ssh: update RIGHT NOW NOW NOW
    Otherwise: update RIGHT NOW NOW but prioritize the former

    https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27

    No, the exploit doesn’t rely on systemd being run or even installed. If you have the poisoned version, update right away please. The infected version is infected even without systemd (just as long as it’s run as other than arg0, which is the case with many init systems.). Now, it is because of systemd that Debian and Red Hat shipped a version of sshd that was dynamically linked to liblzma. So that’s the connection to systemd. But it’s “SSH linked to liblzma” that’s exploited, not “SSH inited by systemd”.

    In conversationabout a year ago from idiomdrottning.orgpermalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.