Anonymous ID: 7a0195 March 8, 2022, 9:18 a.m. No.15812629   🗄️.is 🔗kun   >>2855

Propane closely follows the price of unleaded gasoline.

Rural America uses propane for heating where fuel oil is popular in the cold northeast.

 

Prices skyrocketing.

Propane increased 0.56 USD/GAL or 54.41% since the beginning of 2022, according to trading on a contract for difference (CFD) that tracks the benchmark market for this commodity.

https://tradingeconomics.com/commodity/propane

Anonymous ID: 7a0195 March 8, 2022, 9:24 a.m. No.15812678   🗄️.is 🔗kun

ATL->Man arrested after police say he’s been stealing gas by drilling holes in cars

 

https://www.wsbtv.com/news/local/atlanta/man-arrested-after-police-say-hes-been-stealing-gas-by-drilling-holes-cars/O5JKILQRDZCQ3PY4B4R4QCGVGE/

 

1970's gas embargo redo heading to a major city near you.

 

Long lines, high prices and fisticuffs: The 1970s gas shortages fueled bedlam in America

 

https://www.washingtonpost.com/history/2021/05/13/gas-shortages-1970s/

Anonymous ID: 7a0195 March 8, 2022, 10:19 a.m. No.15813038   🗄️.is 🔗kun

Another Linux Kernel Bug Found that can allow an Unauthenticated user Root Privileges

 

https://decryptedtech.com/another-linux-kernel-bug-found-that-can-allow-an-unauthenticated-user-root-privileges

Linux, often thought of as a more secure alternative to Microsoft, has not had an easy year. We have seen vulnerabilities that affect the iSCSI subsystem, the Extended Berkeley Packet Filter, the Polkit pkexec component bug and now two Kernel bugs. The latest one, dubbed “dirty pipe” It is a method that could allow a “local” user to overwrite read-only files including SUID flies.

 

The flaw is present in Linux Kernels 5.8 and later (including Android) and effects most major distributions of Linux. The flaw, tracked as CVE-2022-0847, is like one that was patched in 2016 (CVE-2015-5195). The researcher that found the exposed flaw is Max Kellermann. Kellerman states that the vulnerability in question is easy to exploit and represents a significant danger to production Linux systems where SSH access is often how things are managed (especially web servers).

 

As part of the disclosure Kellerman released proof of concept code to validate his finding. With it he was able to inject his own data into normally read-only and protected files (immutable files). His proof-of-concept lead to the creation of a simple script (from another security researcher BLASTY) that allows a user to drop a root shell on a targeted device then execute a script. It does this by patching the /usr/bin/su command (using the flaw), this in turn drops the shell at /tmp/sh. Once the command it done, the user has root, and the security game is over.