When Deepin will release the security parches for kernel 5.10.36 and 5.12.9?
For this specific case, executing the commands patches the system
LISTA=$(find /boot -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /etc -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /opt -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /usr -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done;
I tried reinstalling the corresponding linux-image-package, but the folder permissions were still vulnerable.
I suspect that purging the packages will still leave folders with vulnerable permissions.
No replies yet
Featured Collection
Popular Ranking
Popular Events
When Deepin will release the security parches for kernel 5.10.36 and 5.12.9?
For this specific case, executing the commands patches the system
LISTA=$(find /boot -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /etc -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /opt -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done; LISTA=$(find /usr -user $(whoami) 2>/dev/null); for VARIABLE in $LISTA; do sudo chown root:root $VARIABLE; sudo chmod go-w $VARIABLE; done;
I tried reinstalling the corresponding linux-image-package, but the folder permissions were still vulnerable.
I suspect that purging the packages will still leave folders with vulnerable permissions.