📊 0.0/10
🏢 Linux
📝 In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM
Otherwise accessing them...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-201566
#cybersecurity #infosec #cve #euvd
📊 0.0/10
🏢 Linux
📝 In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM
Otherwise accessing them...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-201566
#cybersecurity #infosec #cve #euvd
CVE ID : CVE-2025-40289
Published : Dec. 6, 2025, 10:15 p.m. | 51 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: hide VRAM sysfs attri...
CVE ID : CVE-2025-40289
Published : Dec. 6, 2025, 10:15 p.m. | 51 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: hide VRAM sysfs attri...
- a relatively good kernel driver that exposes all the useful hardware capabilities through sysfs files
- no documentation for the sysfs files
- a useless userspace daemon that spends thousands of lines of code to provide a D-Bus API that […]
- a relatively good kernel driver that exposes all the useful hardware capabilities through sysfs files
- no documentation for the sysfs files
- a useless userspace daemon that spends thousands of lines of code to provide a D-Bus API that […]
Interest | Match | Feed
Origin | Interest | Match
Origin | Interest | Match
Linuxでは入力デバイス毎に用意されるhid_device構造体の直下にバッテリー残量や充電状況を記録するメンバが用意されている。デバイスドライバはこのメンバにデバイスから得たバッテリーの情報を記録する。ユーザ空間アプリケーションはsysfsを介してこの情報を読む事ができる
Linuxでは入力デバイス毎に用意されるhid_device構造体の直下にバッテリー残量や充電状況を記録するメンバが用意されている。デバイスドライバはこのメンバにデバイスから得たバッテリーの情報を記録する。ユーザ空間アプリケーションはsysfsを介してこの情報を読む事ができる
$ ./linux (...) eth0=tuntap,,,192.168.0.254
Dans le système :
$ mount proc -t proc /proc
$ mount sysfs -t sysfs /sys
$ mount devpts -t devpts /dev/pts
$ ip link set lo up
$ ip addr add 192.168.0.2/24 dev eth0
$ ip link set eth0 up
$ ./linux (...) eth0=tuntap,,,192.168.0.254
Dans le système :
$ mount proc -t proc /proc
$ mount sysfs -t sysfs /sys
$ mount devpts -t devpts /dev/pts
$ ip link set lo up
$ ip addr add 192.168.0.2/24 dev eth0
$ ip link set eth0 up
Interest | Match | Feed
Origin | Interest | Match
Interest | Match | Feed
Origin | Interest | Match
CVE ID : CVE-2025-40023
Published : Oct. 24, 2025, 1:15 p.m. | 1 hour, 27 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
drm/xe/vf: Don't expo...
CVE ID : CVE-2025-40023
Published : Oct. 24, 2025, 1:15 p.m. | 1 hour, 27 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved:
drm/xe/vf: Don't expo...
Origin | Interest | Match
Origin | Interest | Match
Origin | Interest | Match
Interest | Match | Feed
Interest | Match | Feed
Origin | Interest | Match
what the fuck?
what the fuck?
user_namespace.2 sys "/sys" can be mounted, along with proc, cgroups, tmpfs
1) "/sys" is not a filesystem, it's sysfs, you cannot mount "/sys" ever
2) this returns EPERM because it is a lie, sysfs can't be mounted
user_namespace.2 sys "/sys" can be mounted, along with proc, cgroups, tmpfs
1) "/sys" is not a filesystem, it's sysfs, you cannot mount "/sys" ever
2) this returns EPERM because it is a lie, sysfs can't be mounted
Interest | Match | Feed