Tag: Fedora
-
CVE-2024-3094: All Clear
It’s official — CVE-2024-3094 is the “Backdoor in XZ Utils That Almost Happened“. Fortunately, the malware was detected before we …
-
XZ Utils backdoor update: Which Linux distros are affected and what can you do?
The news that XZ Utils, a compression utility present in most Linux distributions, has been backdoored by a supposedly trusted maintainer …
-
CVE-2024-3094: Urgent alert for Fedora Linux 40 and Rawhide users
The Fedora Project was made aware of CVE-2024-3094 on Friday, March 29th related to the xz tools and libraries. At this time, Fedora …
-
How to Reset Forgotten Root Password in RHEL Systems
This article will guide you through simple steps to reset forgotten root passwords in RHEL-based Linux distributions such as Fedora, CentOS …
-
Automatically decrypt your disk using TPM2
Entering the passphrase to decrypt the disk at boot can become quite tedious. On modern systems a secure hardware chip called “TPM” …
-
Fedora Change Proposal: Supporting Unified Kernel Images for Improved Security
While “this proposal will only be implemented if approved by the Fedora Engineering Steering Committee,” Phoronix …
-
Fedora 37 Release Has Been Postponed for the Second Time
Due to an OpenSSL vulnerability, Fedora Linux 37 has been postponed with a new release date. Learn more …
-
Fedora and Parental Controls
We all have people around us, whom we hold dear. Some of them might even rely on you to keep them …
-
Researchers flag 7-years-old privilege escalation flaw in Linux kernel (CVE-2021-33909)
A vulnerability (CVE-2021-33909) in the Linux kernel’s filesystem layer that may allow local, unprivileged attackers to gain root …
-
Using network bound disk encryption with Stratis
In an environment with many encrypted disks, unlocking them all is a difficult task. Network bound disk encryption (NBDE) helps automate …
-
Getting started with Stratis encryption
Stratis is described on its official website as an “easy to use local storage management for Linux.” See this short video for a quick …
-
Web of Trust, Part 2: Tutorial
The previous article looked at how the Web of Trust works in concept, and how the Web of Trust is implemented at Fedora. In this article, …
●●●