| github | https://github.com/Julien00859 |
| codeberg | https://codeberg.org/drlazor8 |
| xmpp | [email protected] |
| github | https://github.com/Julien00859 |
| codeberg | https://codeberg.org/drlazor8 |
| xmpp | [email protected] |
CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root | Qualys
All Linux kernels since v4.11 are vulnerable on any distribution that integrates AppArmor β including Ubuntu, Debian, SUSE, and their derivatives β exposing a flaw that any unprivileged local user can exploit.
Outch. π¬

Qualys TRU has discovered confused deputy vulnerabilities in AppArmor (named βCrackArmorβ) that allow unprivileged users to bypass kernel protections, escalate to root, and break container isolation. The flaw has existed since 2010, and compromises 20 million+ systems globally. Immediate kernel patching is recommended to neutralize these vulnerabilities.
So the Spaces are now merged in Movim main branch! π The official instance https://mov.im/ has been updated πΈ!
Do you want to know how it was done? And how it is actually implemented in Movim? I wrote a very detailed blog post about it there: https://mov.im/community/pubsub.movim.eu/Movim/fb46d699-adc1-4fda-a76e-71ca1d246b80 π
The upcoming days will now be spent on stabilizing and fixing all the bugs we can find π
And as always, if you want to support me in this amazing journey https://movim.eu/#fund β¨ And don't forget to spread around the good news π’!
Trying xmpp as an alternatives to discord...
Conversation (Android): doesn't support group-call
Dino (Linux): can do group-call... but those are invisible to movim
Movim (Web): can do group-call... but those are invisible to dino
π«
Matplotlib maintainer Scott Shambaugh has blogged about the AI agent blog shaming experience now.
https://theshamblog.com/an-ai-agent-published-a-hit-piece-on-me/