#redhat

6 posts · Last used 8d

Back to Timeline
Larvitz
@Larvitz@burningboard.net · May 08, 2026
CVE-2026-43284 / "Dirty Frag" .. Antoher one of those nasty local-privilege-escallations. Quickfix for Centos/Fedora based systems: printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf && rmmod esp4 esp6 rxrpc 2>/dev/null; true Caution: That also effectively disables IPSEC and AFS client support. But it can easily be reverted by removing the file when a patched kernel arrives. #dirtyfrag #cve_2026_43284 #security #centos #fedora #redhat
0
0
0
ikkeT
@ikkeT@mementomori.social · May 06, 2026
#OpenShift hosters 🔊 Red Hat has released blocker for copy-fail vulnerability, no reboots needed: https://access.redhat.com/solutions/7142136 #RedHat #CopyFail #CVE202631431
4
0
2
TheBadPlace
@TheBadPlace@mastodon.ozioso.online · May 01, 2026
Feed: All Latest | Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers by Dan Goodin, Ars Technica AI generated summary, Read the full article for complete information. A newly disclosed Linux kernel vulnerability, dubbed CopyFail (CVE‑2026‑31431), enables a local privilege‑escalation that lets an unprivileged attacker obtain root on virtually any Linux distribution with a single, unmodified script. Released by security firm Theori after a brief private disclosure, the flaw resides in the kernel’s crypto API where an AEAD template copy operation overwrites adjacent memory, allowing the attacker to elevate privileges, break out of containers, compromise multi‑tenant systems, and hijack CI/CD pipelines. Although patches were quickly issued for several kernel versions (7.0, 6.19.12, 6.18.12, 6.12.85, 6.6.137, 6.1.170, 5.15.204, and 5.10.254), many distributions had not yet applied them, leaving countless desktops, servers, and cloud environments exposed. Experts warn that the exploit’s reliability surpasses earlier high‑profile kernel bugs like Dirty Pipe and Dirty Cow, and they urge all Linux users to verify that their systems incorporate the relevant fixes or follow vendor mitigation guidance. Read more: https://www.wired.com/story/dangerous-new-linux-exploit-gives-attackers-root-access-to-countless-computers/ #Theori #Ubuntu #Amazon #SUSE #Debian #RedHat #Fedora #ArchLinux #Kubernetes #Linux #copyfail #security #security_cyberattacksandhacks #security_securitynews
0
0
1
Mathias
@Mathias@burningboard.net · Apr 14, 2026
#redhat Leute mit Nebenjob
0
1
0
In reply to
JdeBP__dup_33984
@JdeBP__dup_33984@mastodonapp.uk · Mar 05, 2026
@bobulous@fosstodon.org See the widely publicized announcement by the developer of #MidnightBSD, which caused a lot of people, including me, into looking at the actual law. https://nitter.net/midnightbsd/status/2027101491211718765 The only people concerned with free software, apparently, as the bill made its way through the #California legislature, were Oakland Privacy, and they were only interested in 'gratis' free software on the Google and Apple Stores and the impacts on its development. The various committee analyses are on that legislature page, and they give the objectors's objections. I have yet to find a mention of BSDs, Linux-based operating systems, or even Unix. Goodness knows what #IBM is going to do about #RHEL and #RPM. Clearly they completely missed a very important lobbying opportunity. I wonder if the IBM legal people know about this even yet. @ariadne@social.treehouse.systems @RunxiYu@social.treehouse.systems @reallyflygreg@mstdn.ca @toddalio@mstdn.ca #USLaw #CaliforniaLaw #FreeSoftware #RedHat
1
0
1
ikkeT
@ikkeT@mementomori.social · Feb 01, 2026
Interesting and very educating training week ends up to pieceful relaxing skiing on sea. Perfect -14°C with no wind. It was really nice to see all nice colleagues from around the globe and nerd around for a week! #RedHat #skiing
3
0
0

You've seen all posts