shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

270
active users

#chroot

0 posts0 participants0 posts today
Scripter :verified_flashing:<p>chwoot: Kritische Linux-Lücke macht Nutzer auf den meisten Systemen zu Root | heise online<br><a href="https://www.heise.de/news/chwoot-Kritische-Linux-Luecke-macht-Nutzer-auf-den-meisten-Systemen-zu-Root-10466885.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/chwoot-Kritische</span><span class="invisible">-Linux-Luecke-macht-Nutzer-auf-den-meisten-Systemen-zu-Root-10466885.html</span></a> <a href="https://social.tchncs.de/tags/Betriebssystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Betriebssystem</span></a> <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.tchncs.de/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> <a href="https://social.tchncs.de/tags/sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudo</span></a> <a href="https://social.tchncs.de/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> <a href="https://social.tchncs.de/tags/chwoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chwoot</span></a></p>
Verfassungklage@troet.cafe<p><a href="https://troet.cafe/tags/Root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Root</span></a>-Zugriff für alle: </p><p><a href="https://troet.cafe/tags/Kritische" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kritische</span></a> <a href="https://troet.cafe/tags/Sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sudo</span></a>-Lücke gefährdet unzählige <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>-Systeme</p><p><a href="https://troet.cafe/tags/Forscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forscher</span></a> haben eine gefährliche <a href="https://troet.cafe/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> im <a href="https://troet.cafe/tags/Kommandozeilentool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kommandozeilentool</span></a> <a href="https://troet.cafe/tags/Sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sudo</span></a> entdeckt. Angreifer können mit wenig Aufwand Root-Rechte erlangen.</p><p>Die <a href="https://troet.cafe/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> besteht laut Blogbeitrag der <a href="https://troet.cafe/tags/Forscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forscher</span></a> seit der im Juni 2023 veröffentlichten <a href="https://troet.cafe/tags/Sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sudo</span></a>-Version 1.9.14 – und damit seit rund zwei Jahren. Ursache ist wohl ein Fehler in der <a href="https://troet.cafe/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a>- <a href="https://troet.cafe/tags/Implementierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Implementierung</span></a>. </p><p><a href="https://www.golem.de/news/root-zugriff-fuer-alle-kritische-sudo-luecke-gefaehrdet-unzaehlige-linux-systeme-2507-197635.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/root-zugriff-fue</span><span class="invisible">r-alle-kritische-sudo-luecke-gefaehrdet-unzaehlige-linux-systeme-2507-197635.html</span></a></p>
Droppie [infosec] 🐨:archlinux: :kde: :firefox_nightly: :thunderbird: :vegan:​<p><span class="h-card" translate="no"><a href="https://infosec.space/@MsDropbear42" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MsDropbear42</span></a></span> <em>Weeeeeeeeell</em>, now i've made time to investigate what ails poor lil ol' ONT, &amp; it seems pretty terminal [<em>boom, tish</em>]. The failure to finish booting occurred after i did a system update after not doing so for several months. OS was <a href="https://infosec.space/tags/SparkyLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SparkyLinux</span></a> Testing / semi-rolling. Afaict, whatever caused the damage did a pretty good job:</p><ul><li>the <a href="https://infosec.space/tags/bootloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootloader</span></a> had vaporised</li><li>the <a href="https://infosec.space/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> <a href="https://infosec.space/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> seems to have been damaged [even booting from a Live usb stick couldn't unlock the drive, my LUKS pswd being rejected despite absolutely certainly being correct]; it accepts my LUKS password during boot, then says "Slot 0 opened", then... just sits there, evermore. Sigh. </li></ul><p>I considered trying to repair the bootloader via a <a href="https://infosec.space/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a>, but even if that succeeded i frankly had little appetite to then do battle with a sulky LUKS. This pc is a very old clunker, spinning rust HDDs only, merely 8 GB RAM, i7 though old model, &amp; i'd repurposed it to be my lounge-room media pc several months ago without bothering to change anything about its extant OS... &amp; tbh Sparky had been wearing a bit thin on me anyway for a coupla months in this role. </p><p>So i decided not to bother attempting repairs, &amp; instead make a clean break with an alternative distro that i feel should be just about ideal for this use as a media pc, whose only function is to run a browser, &amp; my VPN app, for my nightly movies &amp; shows streaming. As such, i really just don't wanna be arsed with running updates on it often, &amp; generally mollycoddling it like i do with my <em>real</em> pooter [<a href="https://infosec.space/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://infosec.space/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a> <a href="https://infosec.space/tags/Plasma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Plasma</span></a>]... i just want it to live happily in the darkness of my timber cabinet, asking little of me re upkeep, &amp; just purring away. </p><p>Thus, it now has <a href="https://infosec.space/tags/LinuxMint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxMint</span></a> <a href="https://infosec.space/tags/LMDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMDE</span></a> 6. Gotta hand it to ol' Clem &amp; Co; they've done a really nice job with it. </p><p><a href="https://infosec.space/tags/ONT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ONT</span></a> <a href="https://infosec.space/tags/PistonBroke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PistonBroke</span></a></p>
r1w1s1I wrote a simple shell script to manage a Slackware chroot environment for building packages.<br><br>Tested with Slackware-current. You can create and access the chroot easily with just a few commands.<br><br>Source:<br><a href="https://git.sr.ht/~r1w1s1/slackbuilds/blob/main/chroot-manager.sh" rel="nofollow noopener" target="_blank">https://git.sr.ht/~r1w1s1/slackbuilds/blob/main/chroot-manager.sh</a><br><br><a href="https://snac.bsd.cafe?t=slackware" class="mention hashtag" rel="nofollow noopener" target="_blank">#slackware</a> <a href="https://snac.bsd.cafe?t=shellscript" class="mention hashtag" rel="nofollow noopener" target="_blank">#shellscript</a> <a href="https://snac.bsd.cafe?t=chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#chroot</a> <a href="https://snac.bsd.cafe?t=linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#Linux</a><br>
OSTechNix<p>How To Automate Mounting /dev In Chroot Environments In Linux <a href="https://floss.social/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a> <a href="https://floss.social/tags/mmdebstrap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mmdebstrap</span></a> <a href="https://floss.social/tags/Troubleshooting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Troubleshooting</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/Linuxhowto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxhowto</span></a> <a href="https://floss.social/tags/Linuxadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxadmin</span></a> <br><a href="https://ostechnix.com/auto-mount-dev-in-chroot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/auto-mount-dev-i</span><span class="invisible">n-chroot/</span></a></p>
OSTechNix<p>How To Create Chroot Environments Using Mmdebstrap In Debian Linux <a href="https://floss.social/tags/Mmdebstrap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mmdebstrap</span></a> <a href="https://floss.social/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a> <a href="https://floss.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/Linuxadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxadmin</span></a> <a href="https://floss.social/tags/Linuxhowto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxhowto</span></a> <br><a href="https://ostechnix.com/create-chroot-environments-using-mmdebstrap-in-debian-linux/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/create-chroot-en</span><span class="invisible">vironments-using-mmdebstrap-in-debian-linux/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://hackers.town/@calcifer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>calcifer</span></a></span> personally, I want really simple applications that have all their dependencies statically.compiled into them <em>and</em> run under their own <em>"username"</em> to enshure encapsulation and isolation...</p><ul><li>is that <a href="https://infosec.space/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> <a href="https://infosec.space/tags/jails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jails</span></a> / <a href="https://infosec.space/tags/bhyve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bhyve</span></a> <em>but worse</em>?</li></ul>
Josh Braun<p><span class="h-card" translate="no"><a href="https://toot.liw.fi/@liw" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>liw</span></a></span> <span class="h-card" translate="no"><a href="https://fediscience.org/@martinvermeer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>martinvermeer</span></a></span> Yeah, given the number of times my Linux machine has refused to boot properly after an update, I’m not exactly crowing about this. 😂 <a href="https://sciences.social/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a></p>
V_S<p>AND WE ARE LIVE!!!</p><p>STEP ONE COMPLETE!! Now to learn how to use the darn thing.</p><p>Also the <a href="https://furry.engineer/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> idea worked!! I AM RUNNING APPIMAGES ON VOID LINUX!!! L E T ' S F _ C K I N G G O O O O O O O O O O O O O _</p><p><a href="https://furry.engineer/tags/voidlinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>voidlinux</span></a> <a href="https://furry.engineer/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://furry.engineer/tags/hardwarehacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardwarehacking</span></a> <a href="https://furry.engineer/tags/logicanalyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>logicanalyzer</span></a> <a href="https://furry.engineer/tags/HYPED" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HYPED</span></a> <a href="https://furry.engineer/tags/EXCITED" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EXCITED</span></a></p>