• 5 Posts
  • 203 Comments
Joined 2 years ago
Cake day: June 24th, 2023







  • But… your original comment is just… wrong?

    This isn’t a critical security flaw unless you have the worst partition scheme on your encrypted volumes imaginable.

    The default LUKS partition scheme is vulnerable.

    It’s not even a process flaw at that point, just “possible”.

    There is a successful POC, it is a flaw.

    you can compromise disks once encrypted because everything is happening in an in-memory boot process.

    This is not just in-memory. This is modifying the unencrypted part of initramfs on disk. Powering off the machine does not remove the exploit.






  • I just validated that the latest version of the LDAP privilege escalation issue is not an issue anymore. The curl script is in the ticket.

    This was the one where a standard user could get plugin credentials, such as the LDAP bind user, and change the LDAP endpoint. I.E., bad.

    I chose this one because after going through all of them, it was the only one that allowed access to something that wasn’t just data in Jellyfin.

    So for me, security is less of an issue knowing that, as only family use the service, and the remaining issues all require a logged in user (hit admin endpoint with user token).

    Plus, I tried a few of those and they were also fixed, just not documented yet. I didn’t add to those tickets because I was not as formal with my testing.

    @EncryptKeeper@lemmy.world