Language Selection

English French German Italian Portuguese Spanish

first post- kernels and whatnot

Filed under
News

Well I signed up at the site after I seen they posted on of my howtos which I am thankful for. It was the one on the grsecurity patched kernel. I think it should help quite a few people as there are so many local root exploits out now and most distro's security and dev teams are doing nothing about it. I know I went in centos irc and they was like, "well the 2.6.9-34.0.2.EL kernel is patched against the prctl exploit but not the /proc exploit" They advised me to enable selinux but I was afraid it would interfere with my control panel software and scripts i have running. I asked when they would have the new kernel they said they were working on it. that was about a week ago now.

But as I found out there is no centos dev team, at least not that I know of. All they do is rip redhat's packages and that's is. Which isn't such a bad thing as you are getting an enterprise os for free.

I have tried all local root exploits lately against the latest grsecurity kernel and none worked. Which I do have /proc mounted as nosuid as a precaution. Next is to learn how to use the acl and other features of grsecurity.

More in Tux Machines

Android Leftovers

DragonFlyBSD 5.2.2 Released To Fix The Lazy State Save/Restore Bug

DragonFlyBSD 5.2.2 is now available as the latest stable release to this popular BSD operating system. While there aren't usually two point releases per cycle for DragonFlyBSD, the v5.2.2 release is coming to address the recent "Lazy FPU" vulnerability affecting Intel CPUs due to Lazy State Save/Restore as the newest CPU speculation bug. DragonFlyBSD began patching their kernel earlier this month and now those fixes are available in stable form with the DragonFlyBSD 5.2.2 release. The OpenBSD folks have also been changing around their kernel and FreeBSD 11.2 RC3 is also mitigated. Read more

Canonical/Ubuntu: Canonical's Engineering Tech Lead, Field Product Manager, and Designers'/Developers' Updates

  • A Complete Look At Spectre V1/V2/V4 & Meltdown
    Canonical's Engineering Tech Lead, Gavin Guo, has passed along a big slide deck on a presentation he is preparing about the Spectre and Meltdown CPU vulnerabilities. Gavin's presentation is mostly focused on Spectre V2 since that is vulnerable to attacking the host system from a guest VM, but the other vulnerabilities are also covered in his 77-page slide deck with great detail.
  • A unified OpenStack for a scalable open infrastructure
    Stu Miniman and John Boyer of theCUBE interviewed Mark Baker, Field Product Manager, Canonical at the OpenStack Summit in Vancouver. Read on to to find out about OpenStack’s increasing maturity. The Kubernetes and OpenStack story isn’t simple. Challenges exist, and plenty of pathfinding still needs to take place when it comes to Kubernetes. Customers want to take different approaches with how they want to plug together OpenStack components in order to create a unified stack is complex. Some customers want Kubernetes running alongside OpenStack, or on top of OpenStack, or even OpenStack running on Kubernetes.
  • Design and Web team summary – 18 June 2018
    Welcome to the latest work and updates from the design and web team.
  • Ubuntu Weekly Newsletter Issue 532
    Welcome to the Ubuntu Weekly Newsletter, Issue 532 for the week of June 10 – 16, 2018.

How Linux and Open Tech Empower Medical Healthcare

Open Source is not just for IT industry. Linux and Open Source technologies are impacting Medical and Healthcare industries as well. Read more