en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

268
active users

#glibc

2 posts2 participants1 post today
butterflyofChick ⏚ꝃ⌁⁂<p>First I noticed if this « ğ ».<br>Which is : latin small letter g with breve<br>Unicode : U+011F<br>Graph : <a href="https://graphemica.com/%C4%9F" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">graphemica.com/%C4%9F</span><span class="invisible"></span></a></p><p>In <a href="https://mstdn.fr/tags/Kabyle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kabyle</span></a> the correct one is : « ǧ »<br>Which is : latin small letter g with caron<br>Unicode : U+01E7<br>Graph : <a href="https://graphemica.com/%C7%A7" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">graphemica.com/%C7%A7</span><span class="invisible"></span></a></p><p>In this case, ǧ according to <a href="https://mstdn.fr/tags/CLDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CLDR</span></a> is correct : <a href="https://www.unicode.org/cldr/charts/47/summary/kab.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">unicode.org/cldr/charts/47/sum</span><span class="invisible">mary/kab.html</span></a></p><p>2/…</p><p><a href="https://mstdn.fr/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a></p>
butterflyofChick ⏚ꝃ⌁⁂<p>I was reading this part of kab_DZ collate on glibc and something is not correct :</p><p>Link glibc 2.41-6 : <a href="https://sources.debian.org/src/glibc/2.41-6/localedata/locales/kab_DZ/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sources.debian.org/src/glibc/2</span><span class="invisible">.41-6/localedata/locales/kab_DZ/</span></a></p><p>1/…</p><p><a href="https://mstdn.fr/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://mstdn.fr/tags/Kabyle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kabyle</span></a></p>
Boud<p>The <a href="https://framapiaf.org/tags/Maneage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Maneage</span></a> <a href="https://framapiaf.org/tags/reproducibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reproducibility</span></a> system for scientific research papers that starts from a minimal POSIX-like host OS does not yet build [1] the <a href="https://framapiaf.org/tags/GNUCLibrary" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNUCLibrary</span></a> = <a href="https://framapiaf.org/tags/GLibC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GLibC</span></a> . We have a draft implementation building glibc *after* <a href="https://framapiaf.org/tags/GCC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GCC</span></a> [2]; and an alternative proposal arguing that building glibc *first* and gcc second would be more long-term sustainable [[1] comment18].</p><p>Should GLibC be built first? Why (or why not)?</p><p>[1] <a href="https://savannah.nongnu.org/task/?15390" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">savannah.nongnu.org/task/?1539</span><span class="invisible">0</span></a><br>[2] <a href="https://gitlab.com/maneage/project-dev/-/blob/glibc/reproduce/software/make/core-gnu.mk#L718" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.com/maneage/project-dev</span><span class="invisible">/-/blob/glibc/reproduce/software/make/core-gnu.mk#L718</span></a></p>
Gardiner Bryant<p><strong>The glibc disaster, Wayland HDR update, and more Linux Gaming News!</strong></p> <p><a href="https://subscribeto.me/videos/watch/ab8c04fe-8247-4844-88eb-4af189b21c42" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">subscribeto.me/videos/watch/ab</span><span class="invisible">8c04fe-8247-4844-88eb-4af189b21c42</span></a></p>
mgorny-nyan (he) :autism:🙀🚂🐧<p>If you were ever wondering how fast `<a href="https://social.treehouse.systems/tags/packaging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>packaging</span></a>.tags.sys_tags()` are growing on GNU / <a href="https://social.treehouse.systems/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>, I have a formula for you (unless I screwed up the maths). For <a href="https://social.treehouse.systems/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a> 3.x on <a href="https://social.treehouse.systems/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> 2.y, the total number of tags is:</p><p>2xy + x + 3y + 3</p><p>Or equivalently:</p><p>x(2y + 1) + 3y + 3<br>y(2x + 3) + x + 3</p><p>So all other things equal, every new minor version of <a href="https://social.treehouse.systems/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> introduces (2y + 1) tags, and every new minor version of glibc introduces (2x + 3) tags. For glibc 2.41, this means 83 new tags per CPython version. For CPython 3.13, this means 29 new tags per glibc version.</p><p>Oh, and for a good measure: CPython 3.13 on x86_64 with glibc 2.41 features 1205 compatible wheel tags.</p>
Liam @ GamingOnLinux 🐧🎮<p>The glibc 2.41 update has been causing problems for Linux gaming <a href="https://www.gamingonlinux.com/2025/02/the-glibc-2-41-update-has-been-causing-problems-for-linux-gaming/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gamingonlinux.com/2025/02/the-</span><span class="invisible">glibc-2-41-update-has-been-causing-problems-for-linux-gaming/</span></a></p><p><a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://mastodon.social/tags/LinuxGaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxGaming</span></a></p>
boredsquirrel<p><span class="h-card" translate="no"><a href="https://social.heise.de/@ktn" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ktn</span></a></span> <span class="h-card" translate="no"><a href="https://social.heise.de/@ct_Magazin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ct_Magazin</span></a></span> <span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heiseonline</span></a></span> <span class="h-card" translate="no"><a href="https://techhub.social/@jolla" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jolla</span></a></span> </p><p><a href="https://tux.social/tags/DesktopLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DesktopLinux</span></a> fehlt einfach das Geld für bezahlte Sicherheitsexperten, die ernsthaft viel daran arbeiten.</p><p><a href="https://tux.social/tags/Wayland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wayland</span></a> und <a href="https://tux.social/tags/Pipewire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pipewire</span></a> haben anders als <a href="https://tux.social/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> keine critical mass, um <a href="https://tux.social/tags/Apps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apps</span></a> zu diktieren, an welche Regeln sie sich halten müssen. Und Absprachen (<a href="https://tux.social/tags/waylandprotocols" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>waylandprotocols</span></a>) sind auch mehr als chaotisch.</p><p><a href="https://tux.social/tags/gcc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gcc</span></a> vs. <a href="https://tux.social/tags/clang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clang</span></a>, <a href="https://tux.social/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> vs. <a href="https://tux.social/tags/musl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>musl</span></a>, es gibt irgendwie keinen Konsens für <a href="https://tux.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Thorsten Leemhuis (acct. 1/4)<p>Linus on different levels for the <a href="https://fosstodon.org/tags/x86_64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x86_64</span></a> architecture:</p><p><a href="https://lore.kernel.org/all/CAHk-%3Dwh_b8b1qZF8_obMKpF%2BxfYnPZ6t38F1%2B5pK-eXNyCdJ7g@mail.gmail.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lore.kernel.org/all/CAHk-%3Dwh</span><span class="invisible">_b8b1qZF8_obMKpF%2BxfYnPZ6t38F1%2B5pK-eXNyCdJ7g@mail.gmail.com/</span></a></p><p>'"[…] The whole "v2", "v3", "v4" etc naming seems to be some crazy <a href="https://fosstodon.org/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> artifact and is stupid and needs to die.</p><p>It has no relevance to anything. Please do *not* introduce that mind-fart into the <a href="https://fosstodon.org/tags/kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kernel</span></a> sources.</p><p>[…] it's entirely unofficial, and it's a completely broken model.</p><p>There is a very real model for microarchitectural features, and it's the CPUID bits. […]'" <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/LinuxKernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxKernel</span></a></p>
zirias (on snac)Having my <code>$HOME</code> on <a href="https://snac.bsd.cafe?t=nfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#NFS</a>, I'm sometimes annoyed by lots of applications "freezing" when there's some issue with the NFS server. I just decided I'll try to prevent this in <a href="https://snac.bsd.cafe?t=xmoji" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Xmoji</a>.<br><br>Now, how to do that? <i>Nonblocking</i> mode (which I use for sockets etc) doesn't do anything for regular files, they're <b>always</b> "ready to read/write". Still, actually reading or writing might block your thread. Then there's <a href="https://snac.bsd.cafe?t=posix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#POSIX</a> <a href="https://snac.bsd.cafe?t=aio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#aio</a>. From what I found, this has issues in real implementations, e.g. <a href="https://snac.bsd.cafe?t=freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#FreeBSD</a> uses kernel workers for implementing it, which are limited, and also doesn't even allow it on NFS by default, because it <i>could</i> cause deadlocks. Looking at the <a href="https://snac.bsd.cafe?t=linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Linux</a> side, there seems to be some platform-specific async I/O implementation in the kernel, but <a href="https://snac.bsd.cafe?t=glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#glibc</a> implements the POSIX aio entirely in userspace... 🤯<br><br>Ok, screw all that. I'll do the simple thing and use worker <a href="https://snac.bsd.cafe?t=threads" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#threads</a> for file I/O calls, should be somewhat easy as I already have a "threadpool" in <a href="https://snac.bsd.cafe?t=poser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#poser</a>. I just started doing that in my "filewatcher" in case it needs to use <code>stat()</code>:<br><a href="https://github.com/Zirias/xmoji/commit/8ba637c482e82791c9e20db21ce95a3e854b6f86" rel="nofollow noopener noreferrer" target="_blank">https://github.com/Zirias/xmoji/commit/8ba637c482e82791c9e20db21ce95a3e854b6f86</a><br><br>More to follow ... 😉<br><br><a href="https://snac.bsd.cafe?t=c" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#C</a> <a href="https://snac.bsd.cafe?t=development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#development</a> <a href="https://snac.bsd.cafe?t=async" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#async</a><br>
Mirai<p>I have a question related to distributing games on Linux. I'm making a game from scratch with C and the help of some libraries like SDL2 and Libconfig. </p><p>I've heard that making "portable" programs is quite difficult on Linux due to Glibc and other things related to libraries. How true is this, and what can I do to work around it? Any information is appreciated. </p><p>(Next post) </p><p><a href="https://mstdn.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mstdn.social/tags/GameDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GameDev</span></a> <a href="https://mstdn.social/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://mstdn.social/tags/gcc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gcc</span></a> <a href="https://mstdn.social/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://mstdn.social/tags/Coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Coding</span></a> <a href="https://mstdn.social/tags/Help" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Help</span></a></p>
Alien BOB<p>Slackware-current has absorbed my multilib gcc and glibc packages</p><p>Ever since the birth of 64-bit Slackware in 2009, I have been maintaining a multilib repository. Today, 15 years later, things are changing!</p><p>You may know it or not, depending on your age, but I have created 64-bit Slackware from scratch late 2008 and early 2009 as a project </p><p><a href="https://alien.slackbook.org/blog/slackware-current-has-absorbed-my-multilib-gcc-and-glibc-packages/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alien.slackbook.org/blog/slack</span><span class="invisible">ware-current-has-absorbed-my-multilib-gcc-and-glibc-packages/</span></a></p><p><a href="https://fosstodon.org/tags/Slackware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Slackware</span></a> <a href="https://fosstodon.org/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://fosstodon.org/tags/compat32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compat32</span></a> <a href="https://fosstodon.org/tags/gcc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gcc</span></a> <a href="https://fosstodon.org/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://fosstodon.org/tags/multilib" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>multilib</span></a></p>
Christos Argyropoulos MD, PhD<p>Fun project: a <a href="https://mstdn.science/tags/memory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memory</span></a> manager for multi-lang applications (<a href="https://mstdn.science/tags/c" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c</span></a>, <a href="https://mstdn.science/tags/cplusplus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cplusplus</span></a> <a href="https://mstdn.science/tags/assembly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assembly</span></a> <a href="https://mstdn.science/tags/fortran" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortran</span></a>) in which workflow management is done by <a href="https://mstdn.science/tags/Perl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Perl</span></a>. Currently allocates using either <a href="https://mstdn.science/tags/perl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>perl</span></a> strings or <a href="https://mstdn.science/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> malloc/calloc. Other allocators <a href="https://mstdn.science/tags/jemalloc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jemalloc</span></a> coming soon. <br><a href="https://github.com/chrisarg/task-memmanager" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/chrisarg/task-memma</span><span class="invisible">nager</span></a></p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> 2.40 has been released (<a href="https://mastodon.social/tags/GNU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNU</span></a> / <a href="https://mastodon.social/tags/GNUC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNUC</span></a> / <a href="https://mastodon.social/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> / <a href="https://mastodon.social/tags/LIBC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LIBC</span></a>) <a href="https://gnu.org/software/libc/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gnu.org/software/libc/</span><span class="invisible"></span></a></p>
Tomáš<p>summer</p><p><a href="https://merveilles.town/tags/unix_surrealism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix_surrealism</span></a> <a href="https://merveilles.town/tags/technomage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technomage</span></a> <a href="https://merveilles.town/tags/comic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>comic</span></a> <a href="https://merveilles.town/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://merveilles.town/tags/summer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>summer</span></a> <a href="https://merveilles.town/tags/fediart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediart</span></a> <a href="https://merveilles.town/tags/monochrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monochrome</span></a> <a href="https://merveilles.town/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://merveilles.town/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://merveilles.town/tags/runbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>runbsd</span></a></p>
83r71n<p>A recent discovery has highlighted a serious vulnerability affecting at least 700,000 OpenSSH servers globally. This vulnerability, named "regreSSHion," allows attackers to execute code remotely with root privileges on glibc-based Linux systems. The flaw, identified as CVE-2024-6387, is described as critical and stems from a signal handler race condition within OpenSSH's server. If exploited, this vulnerability could lead to complete system takeover. It's important to note that this vulnerability is a regression of a previously patched issue (CVE-2006-5051) and impacts OpenSSH versions 8.5p1 through 9.7p1. </p><p><a href="https://www.openssh.com/releasenotes.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">openssh.com/releasenotes.html</span><span class="invisible"></span></a></p><p><a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">qualys.com/2024/07/01/cve-2024</span><span class="invisible">-6387/regresshion.txt</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://ioc.exchange/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://ioc.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://ioc.exchange/tags/regresshion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>regresshion</span></a> <a href="https://ioc.exchange/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://ioc.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://ioc.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://ioc.exchange/tags/update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>update</span></a> <a href="https://ioc.exchange/tags/qualys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qualys</span></a></p>
Some Bits: Nelson's Linkblog<p>pollyfill-glibc: Hackery to let new binaries run on old Linux systems. The docs directory has a bunch of interesting technical info on linker tricks<br><a href="https://github.com/corsix/polyfill-glibc/tree/main" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/corsix/polyfill-gli</span><span class="invisible">bc/tree/main</span></a><br> <a href="https://tech.lgbt/tags/compatibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compatibility</span></a> <a href="https://tech.lgbt/tags/via" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>via</span></a>:lobsters <a href="https://tech.lgbt/tags/pollyfill" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pollyfill</span></a> <a href="https://tech.lgbt/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://tech.lgbt/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://tech.lgbt/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://tech.lgbt/tags/libc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libc</span></a> #+</p>
Fell<p>I just learnt about `jemalloc` in order to fix the memory hunger of Synapse.</p><p>So yeah, Python developers will rather hijack the glibc memory allocator than switch to a resource efficient language.</p><p><a href="https://ma.fellr.net/tags/jemalloc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jemalloc</span></a> <a href="https://ma.fellr.net/tags/Matrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Matrix</span></a> <a href="https://ma.fellr.net/tags/Synapse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Synapse</span></a> <a href="https://ma.fellr.net/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://ma.fellr.net/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <a href="https://ma.fellr.net/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a></p>
matthew - retroedge.techQuestion on the PHP glibc vulnerability: <br><br>Does anyone know a blog post or other documentation for how to turn off the character set that allows the vulnerability in Ubuntu and Debian? <br><br>Here's a good blog post by Rocky Linux on the subject, but I'm not sure how to translate the instructions to Debian and Ubuntu. <br><br><a href="https://rockylinux.org/pt_BR/news/glibc-vulnerability-april-2024/?language=en" rel="nofollow noopener noreferrer" target="_blank">https://rockylinux.org/pt_BR/news/glibc-vulnerability-april-2024/?language=en</a><br><br><a class="hashtag" href="https://social.retroedge.tech/tag/sysadmin" rel="nofollow noopener noreferrer" target="_blank">#sysadmin</a> <a class="hashtag" href="https://social.retroedge.tech/tag/security" rel="nofollow noopener noreferrer" target="_blank">#security</a> <a class="hashtag" href="https://social.retroedge.tech/tag/php" rel="nofollow noopener noreferrer" target="_blank">#php</a> <a class="hashtag" href="https://social.retroedge.tech/tag/glibc" rel="nofollow noopener noreferrer" target="_blank">#glibc</a> <a class="hashtag" href="https://social.retroedge.tech/tag/debian" rel="nofollow noopener noreferrer" target="_blank">#debian</a> <a class="hashtag" href="https://social.retroedge.tech/tag/ubuntu" rel="nofollow noopener noreferrer" target="_blank">#ubuntu</a> <a class="hashtag" href="https://social.retroedge.tech/tag/rockylinux" rel="nofollow noopener noreferrer" target="_blank">#rockylinux</a> <a class="hashtag" href="https://social.retroedge.tech/tag/linux" rel="nofollow noopener noreferrer" target="_blank">#linux</a>
mart-w<p>As fixes for the current <a href="https://chaos.social/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> and <a href="https://chaos.social/tags/php" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>php</span></a> <a href="https://chaos.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> are not reliably available yet, keep in mind that a workaround exists for those of you who don’t need support for the ISO-2022-CN-EXT character set: <a href="https://rockylinux.org/news/glibc-vulnerability-april-2024/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rockylinux.org/news/glibc-vuln</span><span class="invisible">erability-april-2024/</span></a></p><p>This should be quite straightforward to apply on most machines – except those running <a href="https://chaos.social/tags/NixOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NixOS</span></a>. If you do use NixOS, my solution might help you bridge the gap until the proper fix is upstream: <a href="https://git.brokentech.cloud/mart-w/nixos-workaround-cve-2024-2961" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.brokentech.cloud/mart-w/ni</span><span class="invisible">xos-workaround-cve-2024-2961</span></a></p><p>Thanks <span class="h-card" translate="no"><a href="https://chaos.social/@hexa" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hexa</span></a></span> for pointing me in the right direction!</p>
Phil Baker :fedora: :freebsd:<p>I just applied this workaround to my two <a href="https://fosstodon.org/tags/AlmaLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlmaLinux</span></a> servers <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/glibc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glibc</span></a> <br><a href="https://rockylinux.org/news/glibc-vulnerability-april-2024/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rockylinux.org/news/glibc-vuln</span><span class="invisible">erability-april-2024/</span></a></p>