Mark Esler
pronouns
they/them
2025-08-21

Congrats on making it to the front page of Linux @tobhe ๐Ÿ˜Ž

lwn.net/Articles/1034579/

Mark Esler boosted:
2025-08-12

@element do you plan to release a security update on F-Droid?

The latest version is June's 1.6.42.

f-droid.org/en/packages/im.vec

2025-08-11

@element do you plan to release a security update on F-Droid?

The latest version is June's 1.6.42.

f-droid.org/en/packages/im.vec

2025-07-29

@till is a great person to work with and goes out of their way to bring tech mentorship around the world. Every year Till hosts events and participates in mentorship programs that empower people to work in FOSS.

I dearly hope that @till and OpenPrinting receive support โค๏ธ

Thank you (and Michael) for making printing on Linux just work.

Mark Esler boosted:
Till Kamppetertill@ubuntu.social
2025-07-29

Urgent help for OpenPrinting needed!

As many here know, I am co-founder and lead of OpenPrinting since 2001, known as the print guru for Linux and free software by many. I also got one of the 8 fellows of the Linux Foundation for this.

Up to now I was working at Canonical, hired back in 2006 just to run OpenPrinting and also to maintain printing-related Ubuntu packages.

... ๐Ÿงต

Please boost.

#OpenPrinting #LinuxFoundation #getfedihired

2025-07-11

@flavorjones the @vuldb CNA is notorious for this!

They've gamified CVE submission and have a paywall (:

Some in the CVE Program community have advocated for revoking VulnDB's CNA privilege, but the CVE Board need examples like this!

Mark Esler boosted:
2025-07-11

Man, someone reported a bug in unreleased Nokogiri code. I said "Thanks, I'll take a look."

Then they opened a CVE for the bug. A bug that never appeared in a released version! Without my consent!

Now I am on an adventure to reject the CVEs and have emailed @vuldb who is the CNA. #osslife #wtf

Mark Esler boosted:
daniel:// stenberg://bagder
2025-07-11
Mark Esler boosted:
Antitree :verified:Antitree@infosec.exchange
2025-07-08

Wrote up my seccomp-diff tool which will extract seccomp BPF from a PID/ container and let you diff it with other things.

The initial release with Jay Beale at Shmoocon was more of a POC. This adds some nice features if you're into seccomp. More info:

antitree.com/2025/07/seccomp-d

(Cross posting to see if anyone's on this platform)

2025-07-07

Waiting for Belgium to find out about Full Disclosure.

Mark Esler boosted:
2025-06-26

This graph is the one I'm most excited about: the lifetime of security flaws in Linux is finally starting to get shorter (and the number of fixed flaws continues to rise).

hachyderm.io/@LinuxSecSummit@s

Graph comparing the average lifetime (in years) of security flaws in the Linux kernel from 2010 to 2024, along with number of fixed flaws. Both are 12 months rolling window.

The lifetime graph from 2010 to 2023 grows slowly over time, becoming relatively flat at about 6-7 years from 2016 until 2023, where it starts a clear downturn.

Over the same time span, the number of security flaw fixes landing has increased (though it is starting to slightly bend toward a flat rate).
2025-06-26
Mark Esler boosted:
Linux Security Summit ๐Ÿง LinuxSecSummit@social.kernel.org
2025-06-26
The first talk of the conference is Kees Cook @kees on 10 years of the Kernel Self Protection Project (KSPP).

Slides: https://static.sched.com/hosted_files/lssna2025/9f/KSPP%20Ten%20Years%20Deep.pdf
2025-06-17

@yossarian congrats to what you achieved at ToB and to you next endeavor.

2025-06-16

It is important to communicate to users the urgency of a security fix.

github.com/ubuntu/authd/securi

2025-06-16

Why is the new #ubuntu authd CVE rated as a medium severity?

>When a user who hasn't logged in to the system before (i.e. doesn't exist in the authd user database) logs in via SSH, the user is considered a member of the root group in the context of the SSH session. That leads to a local privilege escalation if the user should not have root privileges.

They set C-I-A to L-L-N. Clearly confidentially is blown out of the water.

This seems like a critical CVE ~ cvss.js.org/cvssjs/#CVSS:3.0/A

2025-06-07

@joshbressers if you're a CNA, the cve services api to update CVEs is fairly good and quick to update (NVD, which is downstream of cvelistv5, takes a little longer)

Mark Esler boosted:
Kees Cook (old account)kees@fosstodon.org
2025-04-21

Yay! Debian has enabled UBSAN_BOUNDS for array bounds checking in their kernel.
salsa.debian.org/kernel-team/l
Anyone wanting to enforce the checking, don't forget to set the warn_limit sysctl too.

Mark Esler boosted:
Ariadne Conill ๐Ÿฐ:therian:ariadne@treehouse.systems
2025-04-15

5 years ago I said that we needed to move away from centralized identifiers for vulnerability data in favor of linked data to ensure that vulnerability management processes remain healthy and scalable.

Now the centralized CVE identifiers the entire world depends on are possibly going away.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst