When Deepin will release the security parches for kernel 5.10.36 and 5.12.9?
For this specific case, executing the commands patches the system
LISTA=$(find /boot -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /etc -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /opt -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /usr -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done;
I tried reinstalling the corresponding linux-image-package, but the folder permissions were still vulnerable.
I suspect that purging the packages will still leave folders with vulnerable permissions.
暂无回复,快来抢沙发吧
精品汇总
热帖排行
热门活动
When Deepin will release the security parches for kernel 5.10.36 and 5.12.9?
For this specific case, executing the commands patches the system
LISTA=$(find /boot -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /etc -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /opt -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /usr -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done;
I tried reinstalling the corresponding linux-image-package, but the folder permissions were still vulnerable.
I suspect that purging the packages will still leave folders with vulnerable permissions.