<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=6053&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Linux security hole - The Register]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=6053</link>
		<description><![CDATA[The most recent posts in Linux security hole - The Register.]]></description>
		<lastBuildDate>Thu, 05 Oct 2023 13:09:48 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Linux security hole - The Register]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44702#p44702</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>boughtonp wrote:</cite><blockquote><div><p>... already released through the security repos a day before the article.</p></div></blockquote></div><p>See?<br />No time at all.&#160; 8^P</p><p>Cheers,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Thu, 05 Oct 2023 13:09:48 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44702#p44702</guid>
		</item>
		<item>
			<title><![CDATA[Re: Linux security hole - The Register]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44701#p44701</link>
			<description><![CDATA[<div class="quotebox"><cite>Altoid wrote:</cite><blockquote><div><p>As usual. we&#039;ll see a patch/fix in no time at all.</p></div></blockquote></div><p>The patch was already released through the security repos a day before the article.</p>]]></description>
			<author><![CDATA[dummy@example.com (boughtonp)]]></author>
			<pubDate>Thu, 05 Oct 2023 11:48:25 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44701#p44701</guid>
		</item>
		<item>
			<title><![CDATA[Linux security hole - The Register]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44693#p44693</link>
			<description><![CDATA[<p>Hello:</p><p>This appeared on The Register tonight:</p><p>-----------------------------------------------------------------------------------------------------</p><p>Make-me-root &#039;Looney Tunables&#039; security hole on Linux needs your attention<br />By Thomas Claburn - Wed 4 Oct 2023 // 21:27 UTC<br /><a href="https://www.theregister.com/2023/10/04/linux_looney_tunables_bug/" rel="nofollow">https://www.theregister.com/2023/10/04/ … ables_bug/</a></p><p>-----------------------------------------------------------------------------------------------------</p><div class="quotebox"><cite>Thomas Claburn wrote:</cite><blockquote><div><p>... a security hole that can be fairly easily exploited by rogue users, intruders, and malicious software to gain root access ...<br />... a buffer overflow vulnerability in the GNU C Library&#039;s handling of an environmental variable ... <br />... arises from the GNU C Library&#039;s dynamic loader (ld.so) mishandling of the GLIBC_TUNABLES environmental variable.</p></div></blockquote></div><p>As usual. we&#039;ll see a patch/fix in no time at all.</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Thu, 05 Oct 2023 02:40:38 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44693#p44693</guid>
		</item>
	</channel>
</rss>
