Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Friday is `dnf update` and `reboot` day for the machines in my homelab and the servers I run on the internet.

Friday is `dnf update` and `reboot` day for the machines in my homelab and the servers I run on the internet.

Scheduled Pinned Locked Moved Uncategorized
selfhostsysadminlife
4 Posts 2 Posters 7 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jwildeboer@social.wildeboer.netJ This user is from outside of this forum
    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
    jwildeboer@social.wildeboer.net
    wrote last edited by
    #1

    Friday is `dnf update` and `reboot` day for the machines in my homelab and the servers I run on the internet. My machines all run Red Hat Enterprise Linux, so I know I am protected against any new threat that comes with a lot of media fanfare, because we at Red Hat stoically fix things and make the updates available. So as on every Friday, I can relax and enjoy the weekend πŸ™‚

    #SelfHost #SysAdminLife @homelab

    larvitz@burningboard.netL 1 Reply Last reply
    0
    • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

      Friday is `dnf update` and `reboot` day for the machines in my homelab and the servers I run on the internet. My machines all run Red Hat Enterprise Linux, so I know I am protected against any new threat that comes with a lot of media fanfare, because we at Red Hat stoically fix things and make the updates available. So as on every Friday, I can relax and enjoy the weekend πŸ™‚

      #SelfHost #SysAdminLife @homelab

      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.net
      wrote last edited by
      #2

      @jwildeboer @homelab this week, it might be a good idea, to also look at https://access.redhat.com/solutions/7141931 and ensure, either the right errata is applied, or the mentioned mitigations are in place, if you have systems affected by Copy Fail.

      jwildeboer@social.wildeboer.netJ 1 Reply Last reply
      0
      • larvitz@burningboard.netL larvitz@burningboard.net

        @jwildeboer @homelab this week, it might be a good idea, to also look at https://access.redhat.com/solutions/7141931 and ensure, either the right errata is applied, or the mentioned mitigations are in place, if you have systems affected by Copy Fail.

        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
        jwildeboer@social.wildeboer.netJ This user is from outside of this forum
        jwildeboer@social.wildeboer.net
        wrote last edited by
        #3

        @Larvitz Yep, I did the `grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"` on all my exposed servers (and verified that all services still work afterwards). The homelab machines will wait for the kernel update. @homelab

        larvitz@burningboard.netL 1 Reply Last reply
        0
        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

          @Larvitz Yep, I did the `grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"` on all my exposed servers (and verified that all services still work afterwards). The homelab machines will wait for the kernel update. @homelab

          larvitz@burningboard.netL This user is from outside of this forum
          larvitz@burningboard.netL This user is from outside of this forum
          larvitz@burningboard.net
          wrote last edited by
          #4

          @jwildeboer Great πŸ™‚

          Created a little Ansible playbook to apply the mitigation to multiple servers: https://codeberg.org/Larvitz/gists/src/branch/main/2026/20260501-CVE-2026-31431_RHEL_Mitigation.md

          1 Reply Last reply
          0
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups