Hírolvasó
Mire költ egy kiberbűnöző?
Kitűnőre vizsgázna magyarból a Microsoft
"Kifizetéseket kellett leállítani, a csőd szélén a főváros"
[$] The first half of the 6.16 merge window
As of this writing, 5,546 non-merge changesets have been pulled into the mainline kernel repository for the 6.16 release. This is a bit less than half of the total commits for 6.15, so the merge window is well on its way. Read on for our summary of the first half of the 6.16 merge window.
[$] Block-layer bounce buffering bounces out of the kernel
Local vulnerabilities in Kea DHCP
The SUSE Security Team has published a detailed report about security vulnerabilities it discovered in the Kea DHCP server suite from the Internet Systems Consortium (ISC).
Since SUSE is also going to ship Kea DHCP in its products, we performed a routine review of its code base. Even before checking the network security of Kea, we stumbled over a range of local security issues, among them a local root exploit which is possible in many default installations of Kea on Linux and BSD distributions. [...]
This report is based on Kea release 2.6.1. Any source code references in this report relate to this version. Many systems still ship older releases of Kea, but we believe they are all affected as well by the issues described in this report.
The report details seven security issues including local-privilege-escalation and arbitrary file overwrite vulnerabilities. Security fixes for the vulnerabilities have been published in all of the currently supported release series of Kea: 2.4.2, 2.6.3, and the 2.7.9 development release were all released on May 28. Kea has assigned CVE-2025-32801, CVE-2025-32802, and CVE-2025-32803 to the vulnerabilities. Note that some of the CVEs cover multiple security flaws.
Two new stable kernels
Security updates for Thursday
Mindenkit AI-alapú szerkesztéssel lep meg saját születésnapján a Google Fotók
Milliókat költ a Getty Images a Stable Diffusion fejlesztője elleni perre
Formálódik a Telegram és az xAI partnersége
Egységesítené az Apple a rendszerek számozásait
Egyre közelebb a döntés a Meta lehetséges feldarabolásáról
Making openat(2) and friends more useful in practice
In a message to tech@ titled openat(2) is mostly useless, sadly Theo de Raadt (deraadt@) describes how the openat(2) family of system calls has failed to live up to expectations in practice, and he proposes changes that may improve the situation.
Theo writes, List: openbsd-tech Subject: openat(2) is mostly useless, sadly From: "Theo de Raadt" <deraadt () openbsd ! org> Date: 2025-05-28 14:03:29 The family of system calls related to openat(2) are mostly useless in practice, rarely used. When they are used it is often ineffectively or even with performance-reducing results. int openat(int fd, const char *path, int flags, ...); These are the others:
Megérkezett a Tárhely szolgáltatás a DÁP-ba!
Egyelőre nem rázta meg az Nvidiát a kínai pénzcsap elzárása
[$] LWN.net Weekly Edition for May 29, 2025
- Front: Glibc security; How we lost the Internet; Encrypted DNS; 6.15 Development statistics; Filesystem stress-testing; BPF verifier; Network access from BPF; OSPM 2025.
- Briefs: AlmaLinux 10.0; FESCo decision overturned; NixOS 25.05; Pocket, Launchpad retired; Quotes; ...
- Announcements: Newsletters, conferences, security updates, patches, and more.
[$] Glibc project revisits infrastructure security
The GNU C Library (glibc) is the core C library for most Linux distributions, so it is a crucial part of the open-source ecosystem—and an attractive target for any attackers looking to carry out supply-chain attacks. With that being the case, securing the project's infrastructure using industry best practices and improving the security of its development practices are a frequent topic among glibc developers. A recent discussion suggests that improvements are not happening as quickly as some would like.
[$] Allowing BPF programs more access to the network
Mahé Tardy led two sessions about some of the challenges that he, Kornilios Kourtis, and John Fastabend have run into in their work on Tetragon (Apache-licensed BPF-based security monitoring software) at the Linux Storage, Filesystem, Memory Management, and BPF Summit. The session prompted discussion about the feasibility of letting BPF programs send data over the network, as well as potential new kfuncs to let BPF firewalls send TCP reset packets. Tardy presented several possible ways that these could be accomplished.