ekZepp

joined 2 years ago
MODERATOR OF
[–] ekZepp@lemmy.world 2 points 9 hours ago (1 children)

So by this logic a Jedi Council is when...

[–] ekZepp@lemmy.world 3 points 1 day ago

I've listen the first two season. A very entertaining re-imagination of the mythos in modern times. Highly suggested.

117
submitted 1 day ago* (last edited 1 day ago) by ekZepp@lemmy.world to c/starwarsmemes@lemmy.world
 
[–] ekZepp@lemmy.world 30 points 1 day ago* (last edited 1 day ago)
[–] ekZepp@lemmy.world 2 points 3 days ago

And ofc the Sleepy Squid Dragon

 

cross-posted from: https://lemmy.world/post/46310739

cross-posted from: https://lemmy.world/post/46310733

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.

The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori.

"An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root," the vulnerability research team at Xint.io and Theori said.

At its core, the vulnerability stems from a logic flaw in the Linux kernel's cryptographic subsystem, specifically within the algif_aead module. The issue was introduced in a source code commit made in August 2017.

Successful exploitation of the shortcoming could allow a simple 732-byte Python script to edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017, including Amazon Linux, RHEL, SUSE, and Ubuntu. The Python exploit involves four steps -

  • Open an AF_ALG socket and bind to authencesn(hmac(sha256),cbc(aes))
  • Construct the shellcode payload
  • Trigger the write operation to the kernel's cached copy of "/usr/bin/su"
  • Call execve("/usr/bin/su") to load the injected shellcode and run it as root

While the vulnerability is not remotely exploitable in isolation, a local unprivileged user can get root simply by corrupting the page cache of a setuid binary. The same primitive also has cross-container impacts as the page cache is shared across all processes on a system.

 

cross-posted from: https://lemmy.world/post/46310733

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.

The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori.

"An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root," the vulnerability research team at Xint.io and Theori said.

At its core, the vulnerability stems from a logic flaw in the Linux kernel's cryptographic subsystem, specifically within the algif_aead module. The issue was introduced in a source code commit made in August 2017.

Successful exploitation of the shortcoming could allow a simple 732-byte Python script to edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017, including Amazon Linux, RHEL, SUSE, and Ubuntu. The Python exploit involves four steps -

  • Open an AF_ALG socket and bind to authencesn(hmac(sha256),cbc(aes))
  • Construct the shellcode payload
  • Trigger the write operation to the kernel's cached copy of "/usr/bin/su"
  • Call execve("/usr/bin/su") to load the injected shellcode and run it as root

While the vulnerability is not remotely exploitable in isolation, a local unprivileged user can get root simply by corrupting the page cache of a setuid binary. The same primitive also has cross-container impacts as the page cache is shared across all processes on a system.

[–] ekZepp@lemmy.world 16 points 6 days ago
[–] ekZepp@lemmy.world 3 points 6 days ago* (last edited 6 days ago) (3 children)

Arch is like your psychotic ex. Sex is great, but one day, you wake up because she's burning the sheets of your bed while you're still inside.

[–] ekZepp@lemmy.world 1 points 6 days ago

A safe bet is the best bet.

[–] ekZepp@lemmy.world 3 points 6 days ago (3 children)
[–] ekZepp@lemmy.world 2 points 6 days ago* (last edited 6 days ago) (11 children)
 

PS. This is not a critique to Debian-based distros. And i'm not suggesting you to skip Ubintu for Arch either. Arch is a bit advanced and not too easy to new users, so that won't do for some people...

... just install Linux Mint instead.

 

Freelance Zbrush artist / digital concept sculptor

https://www.artstation.com/mutte

https://www.artstation.com/artwork/nJx0xX

 
 

Trailer: https://www.youtube.com/watch?v=H-43VeYGiPM

Warner Bros.’ bizarre 2023 decision to shelve its live-action/animated film, Coyote vs. Acme, sparked outrage both in the industry and among fans online. But the film is finally being released, and Ketchup Entertainment, its new distributor, recently released the trailer. All I can say after watching that trailer is, what the heck was Warner Bros. even thinking? Granted, a killer trailer doesn’t automatically mean it’s a great film, but all the winning elements are here.

 

“It is a universe that lends itself to interactivity. You have detectives, a dark and horrific world, creatures, and ancestral cults devoted to ancient entities. It is a rich and expansive lore.”

So enthuses Tommaso Nuti, Game Director at Big Bad Wolf and creative mind behind the recently-released Cthulhu: The Cosmic Abyss, when asked why H.P. Lovecraft’s singular imaginings seem to be so much more popular in the gaming world than they are in other art forms. Indeed, while there’s a relative dearth of cosmic horror outings nowadays in cinema or on television, it sometimes feels like you can barely move for them on the Steam store. (...)

 
 

cross-posted from: https://lemmy.world/post/45925326

It's amazing what a difference a little bit of time can make: Two years after kicking off what looked to be a long-shot campaign to push back on the practice of shutting down server-dependent videogames once they're no longer profitable, Stop Killing Games founder Ross Scott and organizer Moritz Katzner appeared in front of the European Parliament to present their case—and it seemed to go very well.

Official Stream: https://multimedia.europarl.europa.eu/en/webstreaming/committee-on-internal-market-and-consumer-protection-ordinary-meeting-committee-on-legal-affairs-com_20260416-1100-COMMITTEE-IMCO-JURI-PETI

Digital Fairness Act: https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14622-Digital-Fairness-Act/F33096034_en

view more: next ›