<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Another day, another #Linux security vulnerability!]]></title><description><![CDATA[<p>Another day, another <a href="https://mas.to/tags/Linux" rel="tag">#<span>Linux</span></a> security vulnerability!</p><p>Dirty Frag: <a href="https://github.com/V4bel/dirtyfrag" rel="nofollow noopener"><span>https://</span><span>github.com/V4bel/dirtyfrag</span><span></span></a></p><p>For my fellow <a href="https://mas.to/tags/NixOS" rel="tag">#<span>NixOS</span></a> users, here is the mitigation I applied to my systems: <a href="https://github.com/stapelberg/nix/commit/05e40d77799a8d68dc019b316cb824904a53361c" rel="nofollow noopener"><span>https://</span><span>github.com/stapelberg/nix/comm</span><span>it/05e40d77799a8d68dc019b316cb824904a53361c</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/ec74f821-1cfa-4b91-bc54-200c197b7ba8/another-day-another-linux-security-vulnerability</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 20:51:06 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/ec74f821-1cfa-4b91-bc54-200c197b7ba8.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 08:40:48 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Another day, another #Linux security vulnerability! on Fri, 08 May 2026 12:15:23 GMT]]></title><description><![CDATA[<p><span><a href="/user/zekjur%40mas.to">@<span>zekjur</span></a></span> I do the module block with the install rule; but I think the most elegant is what Debian sysadmin team does: <a href="https://salsa.debian.org/dsa-team/mirror/dsa-puppet/-/blob/production/modules/debian_org/templates/rc.local.erb?ref_type=heads" rel="nofollow noopener"><span>https://</span><span>salsa.debian.org/dsa-team/mirr</span><span>or/dsa-puppet/-/blob/production/modules/debian_org/templates/rc.local.erb?ref_type=heads</span></a></p><p>/etc/rc.local (which runs at boot if systemd/init hooks it, do check that):<br />sleep 60<br />echo 1 &gt; /proc/sys/kernel/modules_disabled</p><p>Thus after the first minute of boot, disable any further module loading.<br />Works on kernels and for modules that one does not use. Thus Debian is fine, RHEL is not for this class of bugs.</p><p>(and one can 0 it if need to load a mod)</p>]]></description><link>https://board.circlewithadot.net/post/https://secluded.ch/users/jeroen/statuses/116538902001472322</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://secluded.ch/users/jeroen/statuses/116538902001472322</guid><dc:creator><![CDATA[jeroen@secluded.ch]]></dc:creator><pubDate>Fri, 08 May 2026 12:15:23 GMT</pubDate></item><item><title><![CDATA[Reply to Another day, another #Linux security vulnerability! on Fri, 08 May 2026 08:42:21 GMT]]></title><description><![CDATA[<p>Now, the exploit did not work as-is on the NixOS 25.11 system I tested, so maybe the exploit code needs more adjustment (buys us more time) or does not work on NixOS for some reason.</p><p>But better safe than sorry! So just mitigate proactively.</p>]]></description><link>https://board.circlewithadot.net/post/https://mas.to/users/zekjur/statuses/116538064354697554</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mas.to/users/zekjur/statuses/116538064354697554</guid><dc:creator><![CDATA[zekjur@mas.to]]></dc:creator><pubDate>Fri, 08 May 2026 08:42:21 GMT</pubDate></item></channel></rss>