That means that all your distributions need to be patched. For me it meant that I need to do to go to all machines both physical and virtual and Patch them.

It is a lot of work that has to be done!

#Linux #termux #Patch #update #upgrade #programming #BSD #InfoSec #ARM #X86 #freedom #OpenSource

@Dendrobatus_Azureus

Do not forget to always patch your Linux / BSD distributions wherever they may reside.
Forgetting to do so may open up your systems for known exploits which is easily avoidable, from the InfoSec perspective

In case you don't know termux yet on ARM architecture go read and learn

Sources:

man man(1)
man apt

#Linux #termux #Patch #update #upgrade #programming #BSD #InfoSec #ARM #X86 #freedom #OpenSource

A SHA instruction set is a set of extensions to the #ARM, #RISCV and #x86 #instructionSetArchitecture which support #hardwareAcceleration of the #SecureHashAlgorithm (SHA) family.
@tj @DianeBruce @tykling We need someone to #Depenguinate #ONIE switches, or at least get #FreeBSD installing on them. Achieving #Broadcom #OpenBCM support is another task. x86 would be easier. I have two #x86 ONIE switches in .UK bootmarked but the #HPE #Alto product line and #Supermicro #whitebox switches are where to look.
🎩✨ Oh joy, yet another riveting exploration of integer overflow checks – because who wouldn't want to dive into the thrilling world of compiler flags and conditional branches? 🤔🔍 Surely, decoding a branch on #x86 is everyone's idea of a fun-filled weekend! 😂🚀
https://danluu.com/integer-overflow/ #integeroverflow #compilerflags #programminghumor #technews #softwaredevelopment #HackerNews #ngated
Integer overflow checking cost

New title screens. Animated!

See them live in web emulator: https://smol.p1x.in/assembly/game12/game12.html

Or MS-DOS: https://smol.p1x.in/assembly/game12/game12.com

p.s. the actual game is in alpha stage, middle of implementing core mechanisms. stay tooned.

#GameDev #IndieDev #x86 #Assembly #asm #PixelArt

Cortex Labs (bootdisk and MS-DOS)

TOTAL OPCODE INSTANCES: 2404
UNIQUE OPCODES: 56
BINARY SIZE: 14522 bytes

#GameDev #IndieDev #x86 #Assembly #asm

Retro News: “EXTRA!! EXTRA!! A Liberação do Código Fonte” - Retrópolis

[BANNER] Secretaria de Comunicação Municipalidade São Tramiel de Retrópolis 01 de maio de 2026 – Atualizado às 08:00 O Código Sagrado do 86-DOS 1.00 vem a público! Neste feriado do Dia do Trabalho, a ilustre Municipalidade de São Tramiel de Retrópolis interrompe a sua habitual sesta debaixo dos carvalhos de silício para celebrar uma conquista

Retrópolis - A cidade dos clássicos

code.fail: C Version with x86+ARM shellcode

Here is an exploit written in C for the the copy.fail (https://copy.fail/, CVE-2026-31431) vulnerability. The embedded shellcode works on other CPUs than X86, with ARM as a primary target.

Code: https://github.com/huberteff/copy-fail-CVE-2026-31431/
Technical writeup: https://www.feyrer.de/redir/copy.fail-C-version-Writeup.html

#copyfail #exploit #c #arm #x86 #cybersecurity

Copy Fail — 732 Bytes to Root

CVE-2026-31431. 100% Reliable Linux LPE — no race, no per-distro offsets, page-cache write that bypasses on-disk file-integrity tools and crosses containers. Found by Xint Code.

Xint