this post was submitted on 14 May 2026
58 points (98.3% liked)

Linux

65258 readers
641 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 7 years ago
MODERATORS
top 28 comments
sorted by: hot top controversial new old

Ah shit, here we go again.

[–] AstroLightz@lemmy.world 9 points 2 days ago (1 children)

I'm sure removing the root user will prevent all escalation exploits. Can't get root if there is no root!

/j

[–] racoon@lemmy.ml 2 points 1 day ago

Make root login 2FA with yubikey or TOTP

[–] cypherpunks@lemmy.ml 42 points 2 days ago (1 children)
[–] Runecrush376@lemmy.world 5 points 2 days ago

😂😂😂

[–] Goingdown@sopuli.xyz 10 points 2 days ago (1 children)

Same workaround works here as with dirty frag. Just disable those kernel modules.

[–] Tenderizer78@lemmy.ml 4 points 2 days ago (1 children)

Maybe the solution is to just, delete a bunch of kernel modules.

How many of them are actually important anyway?

[–] nyan@sh.itjust.works 1 points 1 day ago

Unless you deliberately set out to compile a minimalistic custom kernel, less than half of them. Problem is, you may not be able to easily tell which half.

[–] inari@piefed.zip 10 points 2 days ago

Good news. One fewer zero-day.

[–] gary_host_laptop@lemmy.ml 5 points 2 days ago (1 children)

what's a scenario where you could suffer from this vulnerability?

[–] yogthos@lemmy.ml 4 points 2 days ago

if somebody already has access to your machine, but doesn't have root privileges

[–] fatur0000new@lemmy.ml 11 points 2 days ago (2 children)

If this is quickly solved, there is nothing to worry about

Sorry if my english is bad

[–] Azzu@lemmy.dbzer0.com 5 points 2 days ago

It is already solved. The dirtyfrag patch fixes it already.

[–] neon_nova@lemmy.dbzer0.com 4 points 2 days ago (1 children)

Only think you forgot was punctuation marks at the ends of your sentences.

[–] pastermil@sh.itjust.works 8 points 2 days ago

This simply means the person isn't finished talking.

[–] blobjim@hexbear.net 7 points 2 days ago (2 children)

It's frustrating that there isn't much of an effort to turn Linux into more of a microkernel. Instead the kernel just keeps getting bigger with even more subsystems and modules that can be exploited.

[–] ferric_carcinization@lemmy.ml 1 points 1 day ago (1 children)

A microkernel wouldn't be that useful without a stable module interface, which won't be coming anytime soon.

[–] blobjim@hexbear.net 1 points 10 hours ago

There is at least already a userspace PCIe API. And USB and so on.

[–] racketlauncher831@lemmy.ml 9 points 2 days ago

Systems built on microkernels exist, you know. See Redox.
https://redox-os.org/

[–] Cat_Daddy@hexbear.net 10 points 2 days ago
[–] chgxvjh@hexbear.net 4 points 2 days ago (1 children)

Fuck it, taking my home server offline for a while.

[–] chgxvjh@hexbear.net 2 points 2 days ago

Mainly because of the nginx RCE

[–] wickedrando@lemmy.ml 5 points 2 days ago

apparmor ftw

[–] Infernal_pizza@lemmy.dbzer0.com 3 points 2 days ago (2 children)

At this point we might as well just run everything as root anyway

[–] ranzispa@mander.xyz 7 points 2 days ago

Leave ssh root access open with no password. Attackers will try to escalate privileges as their default strategy, when that fails they'll add your IP to their unhackable blacklist.

[–] altphoto@lemmy.today 1 points 2 days ago

Scarry! Uoi guys on windows better stay away...ohhh privilege!

[–] nyan@sh.itjust.works 1 points 2 days ago

I think you might be able to deactivate this one by turning off XFRM support in a custom-configured kernel, at the cost of losing some types of tunneling. Not going to actually test that, though.