Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices by GeniusMusing (geniusmusing@nu.federati.net), page 31

  1. GeniusMusing (geniusmusing@nu.federati.net)'s status on Thursday, 17-Mar-2022 15:57:49 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    Until you have a second jsmith47...
    In conversation Thursday, 17-Mar-2022 15:57:49 EDT from nu.federati.net permalink
  2. GeniusMusing (geniusmusing@nu.federati.net)'s status on Tuesday, 15-Mar-2022 21:51:10 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    Interesting finding with my servers...
    Debian Linux 10: Linux 4.19.0-19-amd64
    Debian Linux 11: Linux 5.10.0-12-amd64
    I guess I'm "safe".
    In conversation Tuesday, 15-Mar-2022 21:51:10 EDT from nu.federati.net permalink
  3. GeniusMusing (geniusmusing@nu.federati.net)'s status on Tuesday, 15-Mar-2022 21:14:50 EDT GeniusMusing GeniusMusing
    Nasty Linux Netfilter Firewall Security Hole Found Slashdot
    https://linux.slashdot.org/story/22/03/15/221258/nasty-linux-netfilter-firewall-security-hole-found

    >Sophos threat researcher Nick Gregory discovered a hole in Linux's netfilter firewall program that's "exploitable to achieve kernel code execution (via ROP [return-oriented programming]), giving full local privilege escalation, container escape, whatever you want." ZDNet reports:
    >Behind almost all Linux firewalls tools such as iptables; its newer version, nftables; firewalld; and ufw, is netfilter, which controls access to and from Linux's network stack. It's an essential Linux security program, so when a security hole is found in it, it's a big deal. [...] This problem exists because netfilter doesn't handle its hardware offload feature correctly. A local, unprivileged attacker can use this to cause a denial-of-service (DoS), execute arbitrary code, and cause general mayhem. Adding insult to injury, this works even if the hardware being attacked doesn't have offload functionality! That's because, as Gregory wrote to a security list, "Despite being in code dealing with hardware offload, this is reachable when targeting network devices that don't have offload functionality (e.g. lo) as the bug is triggered before the rule creation fails."
    >
    >This vulnerability is present in the Linux kernel versions 5.4 through 5.6.10. It's listed as Common Vulnerabilities and Exposures (CVE-2022-25636), and with a Common Vulnerability Scoring System (CVSS) score of 7.8), this is a real badie. How bad? In its advisory, Red Hat said, "This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat." So, yes, this is bad. Worse still, it affects recent major distribution releases such as Red Hat Enterprise Linux (RHEL) 8.x; Debian Bullseye; Ubuntu Linux, and SUSE Linux Enterprise 15.3. While the Linux kernel netfilter patch has been made, the patch isn't available yet in all distribution releases.

    The Discovery and Exploitation of CVE-2022-25636 · Nick Gregory
    https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/

    Guess I'm one of the lucky ones, Tumbleweed is at 5.16.14.

    My servers on the other hand...
    In conversation Tuesday, 15-Mar-2022 21:14:50 EDT from nu.federati.net permalink
  4. GeniusMusing (geniusmusing@nu.federati.net)'s status on Tuesday, 15-Mar-2022 18:58:14 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    @lnxw48a1
    For some reason that actually sounds like "old" normal...
    In conversation Tuesday, 15-Mar-2022 18:58:14 EDT from nu.federati.net permalink
  5. GeniusMusing (geniusmusing@nu.federati.net)'s status on Saturday, 12-Mar-2022 20:29:49 EST GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    • just an actual husbear
    @lnxw48a1 @guizzy
    Pretty sure any Yoko music on the battle field is not allowed per the Geneva Convention.
    In conversation Saturday, 12-Mar-2022 20:29:49 EST from nu.federati.net permalink
  6. GeniusMusing (geniusmusing@nu.federati.net)'s status on Saturday, 12-Mar-2022 18:44:03 EST GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    @lnxw48a1
    It was not an "Oops", you are really from the future and just wrote the "Correct" date.
    In conversation Saturday, 12-Mar-2022 18:44:03 EST from nu.federati.net permalink
  7. GeniusMusing (geniusmusing@nu.federati.net)'s status on Saturday, 12-Mar-2022 12:14:16 EST GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    Seems like someone read at least one book...
    1984, George Orwell

    >“Always eyes watching you and the voice enveloping you. Asleep or awake, indoors or out of doors, in the bath or bed—no escape. Nothing was your own except the few cubic centimeters in your skull.”

    >"Don’t you see that the whole aim of Newspeak is to narrow the range of thought? In the end we shall make thoughtcrime literally impossible, because there will be no words in which to express it.”

    >“We know that no one ever seizes power with the intention of relinquishing it.”
    In conversation Saturday, 12-Mar-2022 12:14:16 EST from nu.federati.net permalink
  8. GeniusMusing (geniusmusing@nu.federati.net)'s status on Friday, 11-Mar-2022 20:53:51 EST GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    >Good leaders need to have one or more people who will tell them they are wrong...

    Seems we were missing that for the better part of 4 years here in the US...
    In conversation Friday, 11-Mar-2022 20:53:51 EST from nu.federati.net permalink
  9. GeniusMusing (geniusmusing@nu.federati.net)'s status on Wednesday, 09-Mar-2022 17:07:18 EST GeniusMusing GeniusMusing
    Stolen Nvidia Certificates Used To Hide Malware in Driver Downloads Slashdot
    https://nu.federati.net/url/285263

    >Last week Nvidia confirmed that it had been the victim of an internal hack, though it claimed no customer information was compromised. Now we're seeing one of the first effects of the hack on end-users: Nvidia GPU driver packages with malware hidden inside. PCWorld:
    >While it was always possible for malefactors to host links pretending to be drivers in the hopes of installing viruses, trojans, and other nasty stuff on a user's PC, this situation is more concerning. The hackers appear to have leaked Nvidia's official code signing certificates, a means by which users (and Microsoft) can verify that a downloaded program comes from the publisher it says it's from. That's allowing files containing a host of popular malware suites to be posted and downloaded, bypassing Windows Defender's built-in executable verification and slipping past anti-virus software. BleepingComputer reports that two now-expired (but still usable) verification codes have been compromised and used to deliver remote access trojans. Another example, using the Nvidia verification to sign a fake Windows driver, was also spotted.

    Stolen Nvidia certificates used to hide malware in driver downloads PCWorld
    https://nu.federati.net/url/285264

    Kind of glad I have AMD video now...
    In conversation Wednesday, 09-Mar-2022 17:07:18 EST from nu.federati.net permalink

    Attachments

    1. Invalid filename.
      Stolen Nvidia Certificates Used To Hide Malware in Driver Downloads - Slashdot
      Last week Nvidia confirmed that it had been the victim of an internal hack, though it claimed no customer information was compromised. Now we're seeing one of the first effects of the hack on end-users: Nvidia GPU driver packages with malware hidden inside. PCWorld: While it was always possible for ...
    2. Invalid filename.
      Stolen Nvidia certificates used to hide malware in driver downloads
      By Michael Crider from PCWorld
      Nvidia GeForce graphics card owners may be vulnerable to malware if they're not careful with their next GPU driver installation.
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.