mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#udisks

0 Beiträge0 Beteiligte0 Beiträge heute
Hacker News<p>New Linux udisks flaw lets attackers get root on major Linux distros</p><p><a href="https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/linu</span><span class="invisible">x/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/udisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>udisks</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/Attackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Attackers</span></a> <a href="https://mastodon.social/tags/root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>root</span></a> <a href="https://mastodon.social/tags/access" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>access</span></a> <a href="https://mastodon.social/tags/Major" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Major</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/distros" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>distros</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a></p>
E-TARD The LifeCaster<p>I have always had the feeling that PAM is not being looked at as closely as it should be, as well as other parts of Linux.</p><p>Also people "Linux Hardening" everyone should be doing it, as it can sometimes help.</p><p><a href="https://mastodon.online/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://mastodon.online/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.online/tags/UDisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UDisks</span></a> <a href="https://mastodon.online/tags/PAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PAM</span></a> <a href="https://mastodon.online/tags/PluggableAuthenticationModules" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PluggableAuthenticationModules</span></a></p><p><a href="https://thehackernews.com/2025/06/new-linux-flaws-enable-full-root-access.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/06/new-</span><span class="invisible">linux-flaws-enable-full-root-access.html</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.thenewoil.org/tags/udisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>udisks</span></a> flaw lets attackers get root on major Linux distros</p><p><a href="https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/linu</span><span class="invisible">x/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
🔘 G◍M◍◍T 🔘<p>💡 Vulnerabilità PAM e udisks portano a root completo sulle distro Linux</p><p><a href="https://gomoot.com/vulnerabilita-pam-e-udisks-portano-a-root-completo-sulle-distro-linux/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gomoot.com/vulnerabilita-pam-e</span><span class="invisible">-udisks-portano-a-root-completo-sulle-distro-linux/</span></a></p><p><a href="https://mastodon.uno/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> <a href="https://mastodon.uno/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.uno/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://mastodon.uno/tags/fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedora</span></a> <a href="https://mastodon.uno/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> <a href="https://mastodon.uno/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://mastodon.uno/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.uno/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.uno/tags/pam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pam</span></a> <a href="https://mastodon.uno/tags/picks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>picks</span></a> <a href="https://mastodon.uno/tags/root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>root</span></a> <a href="https://mastodon.uno/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.uno/tags/suse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>suse</span></a> <a href="https://mastodon.uno/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://mastodon.uno/tags/tecnologia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tecnologia</span></a> <a href="https://mastodon.uno/tags/ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ubuntu</span></a> <a href="https://mastodon.uno/tags/udisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>udisks</span></a></p>
UNDLTD<p>Released a new version of my cli disk mounter, om.</p><p>Nothing big, mostly I've been polishing the code and doing small incremental improvements:</p><p>Ui:<br>- disallow empty passphrase (until we figure out keyfiles at least)<br>- display errors in red<br>- eliminate unnecessary linebreaks on unmounted filesystems</p><p>Refactorings:<br>- drop anyhow, define explicit errors with thiserror<br>- handle and report most errors inside ui<br>- reimplement `um` alias by preprocessing argv; this will allow flags that require or conflict with `-u` in the future</p><p>Packaging:<br>- nixpkgs: track nixos-24.11 by default</p><p><a href="https://codeberg.org/undltd/om" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">codeberg.org/undltd/om</span><span class="invisible"></span></a></p><p><a href="https://tldr.nettime.org/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://tldr.nettime.org/tags/NixOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NixOS</span></a> <a href="https://tldr.nettime.org/tags/UDisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UDisks</span></a> <a href="https://tldr.nettime.org/tags/Cli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cli</span></a></p>
UNDLTD<p>Yay, I just published a new opensource project! It is a small program I wrote to solve an inconvenience I experienced with my computer use:</p><p>Mounting &amp; unmounting removable devices from command line (on Linux).</p><p>Whatever DE I use, I tend to work mostly with the keyboard. So I wanted a short command that would do this for me with as little typing and interaction as possible.</p><p>That includes mounting / unmounting at the right place, unlocking / locking encrypted volumes, as well as doing anything necessary to safely remove the device (powering off when supported, locking encrypted volumes after unmount, unmounting other partitions on the same device if present, etc).</p><p>It uses UDisks as its backend (but multiple backends can be implemented if desired).</p><p>Before I wrote this tool, I was using `bashmount`, which provided inspiration, but I wanted something a bit more ergonomic for my day to day use.</p><p>Some of you may have voted in a poll I did a long time ago for choosing its name😉</p><p>Hence:</p><p><a href="https://codeberg.org/undltd/om" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">codeberg.org/undltd/om</span><span class="invisible"></span></a></p><p>I decided to release it early, as soon as I started using it myself and felt it does the job. If circumstances permit, I'll be able to add niceties and further smooth out the UX, maybe even add features (see the Roadmap for ideas I have at the moment), but I hope it won't become "big and professional" 😉 Maybe I can port it to *BSD at some point🤔</p><p>Also, this is my first "real" program in Rust.</p><p>Enjoy!</p><p>(P.S. This program was written during and despite russian war.)</p><p><a href="https://tldr.nettime.org/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://tldr.nettime.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://tldr.nettime.org/tags/UDisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UDisks</span></a> <a href="https://tldr.nettime.org/tags/DBus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DBus</span></a> <a href="https://tldr.nettime.org/tags/zbus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zbus</span></a></p>