literature.cafe

515 readers
12 users here now
(and anyone else, really)

This is a general special interest lemmy instance focusing on lovers of all things pertaining to reading and writing and all of the people that enjoy it as well as fandoms and niches that exist within reading circles. We federate with other instances, with our local communities being focused primarily on the above.

If you want to federate a new community, go to lemmyverse.net and copy a link to a community and paste it into the search bar. Be patient!

Also, consider installing instance assistant to better navigate lemmy and find communities better! Find links to download them here: firefox, chrome, edge


Instance Rules
  1. Keep it cozy. (No -isms, bigotry, gatekeeping, or general disrespect. Just be nice!)
  2. Please, no visual porn. (Smut and discussion of smut is OK as long as it is tagged as NSFW.)
  3. No spam.
  4. Be mindful of other instance rules.
  5. Keep self-promo to a minimum.
  6. Tag AI generated content as such.
  7. Please avoid piracy.

Server Info

Registration is open with human approval, just to make sure there's no bots afoot. Approval should take less than a day (and are sometimes near instant)

Please check your spam folder for an email from noreply@literature.cafe if you are having difficulty finding email confirmation.

Community creation is enabled. When creating new communities please be mindful of the instance focus.

If you have any issues or concerns, please message an admin

Fediseer Guarantees


For those visiting from other instances, we have a community directory to make finding communities easier: !411@literature.cafe


We also have alternative lemmy UIs to use for those who want them.

A familiar UI - old.literature.cafe

Photon - ph.literature.cafe

Tesseract (photon fork with more multimedia focused features) - t.literature.cafe


Donations are greatly appreciated and go entirely to server costs but are not required.

List of Patrons Daily Uptime Ratio Weekly Uptime Ratio Average Response Time

founded 1 year ago
ADMINS
1
 
 

The Debian Project released today updated kernel and intel-microcode packages for all supported Debian GNU/Linux releases to address the recently disclosed “Downfall” vulnerability affecting Intel CPUs, as well as the “INCEPTION” hardware vulnerability affecting AMD Zen CPUs.

Discovered by Daniel Moghimi, “Downfall” (a.k.a. CVE-2022-40982) is a GDS (Gather Data Sampling) hardware vulnerability that allows unprivileged speculative access to data that was previously stored in vector registers.

Affecting both Debian GNU/Linux 11 “Bullseye” and Debian GNU/Linux 12 “Bookworm” systems, this vulnerability allows a user to access and steal data from other users on the same computer.

“For instance, a malicious app obtained from an app store could use the Downfall attack to steal sensitive information like passwords, encryption keys, and private data such as banking details, personal emails, and messages,” says Daniel Moghimi.

This flaw is now patched in the 5.10.179-5 kernel package of Debian GNU/Linux 11 “Bullseye” and 6.1.38-4 kernel package of Debian GNU/Linux 12 “Bookworm”. However, to fully mitigate the vulnerability, users will also have to install the intel-microcode 3.20230808.1~deb11u1 package.

The new intel-microcode security update also patches CVE-2022-41804, an unauthorized error injection in Intel SGX or Intel TDX for some Intel Xeon CPUs that may allow a local user to potentially escalate privileges, as well as CVE-2023-23908, a flaw that would lead to improper access control in some 3rd Gen Intel Xeon Scalable CPUs, which may result in an information leak.

On top of that, the new Debian Bullseye and Bookworm kernel security updates address CVE-2023-20569, a security flaw known as “INCEPTION” or Speculative Return Stack Overflow (SRSO), another hardware vulnerability that affects all AMD Zen CPUs.

Discovered by Daniel Trujillo, Johannes Wikner, and Kaveh Razavi, this flaw could allow an attacker to mis-train the CPU BTB to predict non-architectural CALL instructions in the kernel space. Then, the attacker could use this to control the speculative target of a subsequent kernel RET, which could lead to information disclosure via a speculative side-channel attacks.

To mitigate the “Downfall” and “INCEPTION” flaws, the Debian Project recommends all Debian Bullseye and Bookworm users to update their kernel and intel-microcode packages to the new versions available in the repositories as soon as possible.

To update your installations, run the sudo apt update && sudo apt full-upgrade command in a terminal emulator.

2
3
 
 

As usual, very quick fixes for these vulnerabilities on Linux.

This flaw is now patched in the 5.10.179-5 kernel package of Debian GNU/Linux 11 “Bullseye” and 6.1.38-4 kernel package of Debian GNU/Linux 12 “Bookworm”. However, to fully mitigate the vulnerability, users will also have to install the intel-microcode 3.20230808.1~deb11u1 package.

view more: next ›