Language Selection

English French German Italian Portuguese Spanish


Kernel: USB4, Matias Wireless Aluminum Keyboard and 'BleedingTooth' Bluetooth Vulnerability

Filed under

  • Linux 5.10 Continues Maturing The USB4 Support - Phoronix

    Earlier this year Linux 5.6 brought initial USB4 support by leveraging Intel's existing Thunderbolt kernel support for which the updated USB specification is based. Succeeding kernels have continued maturing this USB4 implementation and that has continued with Linux 5.10.

    Included as part of the USB / PHY / Thunderbolt changes for Linux 5.10 are more USB 4 updates, primarily this cycle fixing a few low-level issues in the code. The work continues to be led by Intel open-source engineers.

  • Linux 5.10 To Play Nicely With The Matias Wireless Aluminum Keyboard - Phoronix

    The Matias Wireless Aluminum Keyboard is an Apple-esque keyboard that will be working nicely on Linux 5.10 when it comes to its extra functionality.

    The Matias Wireless Keyboard is a keyboard that's admitted by the Canadian manufacturer to be inspired by Apple keyboards. Among the Matias differences are being a wireless keyboard with a number pad, better cross-platform support, and more. The aluminum wireless keyboard runs in the $85~135 USD range.

  • Linux systems at risk of worrying BleedingTooth Bluetooth vulnerability

    Linux-based operating systems are generally considered to be more secure than the likes of Windows, but that does not mean they are completely without security issues. 

Top 6 hacking tools for Kali Linux

Filed under

In this article, you will learn about the top 6 most used hacking tools for Kali Linux.

Kali Linux is the most popular pen-testing operating system out there. It is popular for having everything under one hood. The user just have to boot it up and just do its things – No setup is required as the people who develop it have done that for you.

In this guide, I list the top 6 most popular and widely used hacking tools for Kali Linux so let’s see what are these.

Read more

Security Leftovers

Filed under
  • Microsoft Fixes RCE Flaws in Out-of-Band Windows Update

    The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could enable remote code execution.

    Microsoft has issued out-of-band patches for two “important” severity vulnerabilities, which if exploited could allow for remote code execution.

    One flaw (CVE-2020-17023) exists in Microsoft’s Visual Studio Code is a free source-code editor made by Microsoft for Windows, Linux and macOS. The other (CVE-2020-17022) is in the Microsoft Windows Codecs Library; the codecs module provides stream and file interfaces for transcoding data in Windows programs.

  • Security updates for Friday

    Security updates have been issued by Fedora (dnf, kernel, libdnf, python27, and python34), SUSE (blktrace, crmsh, php7, and php72), and Ubuntu (containerd,, firefox, htmlunit, and newsbeuter).

  • Bluetooth flaw in Linux kernel allows nearby hackers to execute code

    Google engineer Andy Nguyen is reporting via a Twitter thread that a new security vulnerability has been found in Linux operating systems that run a Bluetooth software stack called BlueZ. Nguyen has named the vulnerability BleedingTooth and claims in his Twitter post that the vulnerability allows nearby hackers to conduct zero-click root-level code execution.

    Linux is an operating system very similar to Unix—it became popular over a decade ago as a research and educational tool due to its open-source licensing and zero cost. In more recent years, it has been used to create dedicated applications—NASA uses it for many of its space applications, for example. It has also become popular for companies making Internet-of-Things (IoT) devices because it allows them to avoid royalty fees.

  • Google Warns of Zero-Click Bluetooth Flaws in Linux-based Devices

    Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices.

    According to security engineer Andy Nguyen, the three flaws — collectively called BleedingTooth — reside in the open-source BlueZ protocol stack that offers support for many of the core Bluetooth layers and protocols for Linux-based systems such as laptops and IoT devices.

  • An Uncommon 20 Years of Commonly Enumerating Vulns
  • This nasty botnet could being rented out as a proxy service | TechRadar

    Cybercriminals set up and use botnets to carry out DDoS attacks, steal data and send spam but now researchers from Bitdefender have found signs that the Interplanetary Storm botnet could be potentially be used for something else entirely.

    Interplanetary Storm (IPStorm) was first discovered by researchers from the cybersecurity firm Anomali in June of last year. However, Bitdefender came upon a new campaign using the botnet when it attacked the company's SSH honeypots in May of this year.

    The malware has continued to evolve since then as its creators have integrated new features in an attempt to try to hid its activities with innocuous traffic. IPStorm's capabilities include being able to backdoor a device running shell commands and generating malicious traffic by scanning the internet and infecting other devices.

  • NPM nukes NodeJS malware opening Windows, Linux reverse shells

    NPM has removed multiple packages hosted on its repository this week that established connection to remote servers and exfiltrated user data.

    These 4 packages had collected over 1,000 total downloads over the course of the last few months up until being removed by NPM yesterday.

Security Leftovers

Filed under

Security Leftovers

Filed under
  • Security updates for Thursday

    Security updates have been issued by Arch Linux (chromium), Debian (httpcomponents-client), Fedora (claws-mail), SUSE (bcm43xx-firmware, crmsh, libqt5-qtimageformats, libqt5-qtsvg, php53, php7, and rubygem-activesupport-4_2), and Ubuntu (php5, php7.0, php7.2, php7.4, python2.7, python3.4, python3.5, python3.6, and vim).

  • SUSE Releases Fixes for BleedingTooth Vulnerabilities

    Yesterday evening, Google and Intel published a new set of software vulnerabilities that affect machines running Linux Kernels that use Bluetooth.
    The set of vulnerabilities, called BleedingTooth, impact SUSE Linux Enterprise systems with enabled Bluetooth hardware.

  • Alcide and SUSE: A New Partnership in DevSecOps

    At SUSE, we are actively looking to find technology alignment with the Partners in our ecosystem that are looking to drive open source innovations. An important function of that partner community is our close collaboration with Independent Software Vendors that are looking to help power digital transformation and enable our customers to innovate and grow. These collaborative partnerships help support our joint customer in their digital journey from on-prem infrastructures towards hybrid- and multi-cloud environments.
    That’s the reason why our engagement with Alcide definitely makes sense. The cloud-native company seeks to bridge the gap between DevOps and Security by providing real-time visibility of operations, with deep analysis and control in order to manage complex Kubernetes deployments.

  • Ubuntu Studio: About Website Security

    We are aware that, as of this writing, our website is not 100% https. Our website is hosted by Canonical. There is an open ticket to get everything changed-over, but these things take time. There is nothing the Ubuntu Studio Team can do to speed this along or fix it ourselves. If you explicitly type-in https:// to your web browser, you should get the secure SSL version of our site.

  • BleedingTooth Linux Exploit Can Lead to Remote Code Execution Within Bluetooth Range

    A new Bluetooth security vulnerability has appeared, and this time Linux is under the gun. Andy Nguyen, an information security researcher, discovered the vulnerabilities. They are collectively known as BleedingTooth, which allows for zero-click remote code execution on Linux devices within Bluetooth range. The code can be executed with kernel privileges, and Intel has rated the exploit at an 8.3 on the common vulnerability scoring system (CVSS).

    According to the research page for CVE-2020-12351, BleedingTooth is a "Heap-Based Type Confusion in L2CAP." What this means is that a malicious user can send data to the Bluetooth subsystem (BlueZ program) in Linux, after which the code for the subsystem does not check the type of payload. As a result, the injection is read into the subsystem, and it can lead to further code execution. As the research page explains, "A remote attacker in short distance knowing the victim's bd [Bluetooth Device] address can send a malicious l2cap packet and cause denial of service or possibly arbitrary code execution with kernel privileges." Andy Nguyen showcased this vulnerability in the video below, where he launched a calculator program on a remote machine.

Security Leftovers

Filed under
  • Third lot of Fisher & Paykel documents leaked on dark web

    Cyber criminals, who used the Windows Nefilim ransomware to attack the appliance maker Fisher & Paykel earlier this year, have released a third tranche of documents, stolen from the company during the incident, on the dark web.

  • Ransomware attacks tend to affect IT staff morale: survey

    IT professionals at companies that have been hit by ransomware are nearly thrice as likely (17%) to feel they are "significantly behind" in understanding online threats in comparison to staff at organisations which have not suffered such attacks (6%), a global survey claims.

  • Google and Intel warn of high-severity Bluetooth security bug in Linux

    Google and Intel are warning of a high-severity Bluetooth flaw in all but the most recent version of the Linux Kernel. While a Google researcher said the bug allows seamless code execution by attackers within Bluetooth range, Intel is characterizing the flaw as providing an escalation of privileges or the disclosure of information.

    The flaw resides in BlueZ, the software stack that by default implements all Bluetooth core protocols and layers for Linux. Besides Linux laptops, it's used in many consumer or industrial Internet-of-things devices. It works with Linux versions 2.4.6 and later.

  • Google and Intel Warn of High-Severity Bluetooth Security Bug In Linux
  • Google and Intel warn of Linux Kernel flaw

    Google and Intel are warning of a high-severity Bluetooth flaw in all but the most recent version of the Linux Kernel.

    Google said the bug allows seamless code execution by attackers within the Bluetooth range, and Intel is characterising the flaw as providing an escalation of privileges or the disclosure of information.

    The flaw resides in BlueZ, the software stack that by default implements all Bluetooth core protocols and layers for Linux. Besides Linux laptops, it is used in many consumer or industrial Internet-of-things devices. It works with Linux versions 2.4.6 and later.

    Dubbed BleedingTooth, by Google engineer Andy Nguyen the bug provides a reliable way for nearby attackers to execute malicious code of their choice on vulnerable Linux devices that use BlueZ for Bluetooth.

Security Leftovers

Filed under
  • Security updates for Wednesday

    Security updates have been issued by Debian (jackson-databind and tomcat8), Fedora (dovecot), Oracle (firefox, spice and spice-gtk, and thunderbird), Red Hat (flash-plugin), SUSE (ansible, crowbar-core, crowbar-openstack, grafana, grafana-natel-discrete-panel, openstack-aodh, openstack-barbican, openstack-cinder, openstack-gnocchi, openstack-heat, openstack-ironic, openstack-magnum, openstack-manila, openstack-monasca-agent, openstack-murano, openstack-neutron, openstack-neutron-vpnaas, openstack-nova, openstack-sahara, python-Pillow, rubygem-crowbar-client, bind, crmsh, kernel, libproxy, php74, rubygem-activesupport-5_1, and tigervnc), and Ubuntu (dom4j, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-hwe-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon, linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2, linux-snapdragon, linux, linux-lts-trusty, and linux-hwe, linux-gke-5.0, linux-gke-5.3, linux-oem-osp1, linux-raspi2-5.3).

  • BleedingTooth: critical kernel Bluetooth vulnerability

    Several flaws in the BlueZ kernel Bluetooth stack prior to Linux 5.9 are being reported by Intel and by Google (GHSA-h637-c88j-47wq, GHSA-7mh3-gq28-gfrq, and GHSA-ccx2-w2r4-x649). They are collectively being called "BleedingTooth", and more information will be forthcoming, though there is already a YouTube video demonstrating remote code execution using BleedingTooth.

  • Google, Intel Warn on 'Zero-Click' Kernel Bug in Linux-Based IoT Devices | Threatpost

    Intel and Google are urging users to update the Linux kernel to version 5.9 or later.

    Google and Intel are warning of a high-severity flaw in BlueZ, the Linux Bluetooth protocol stack that provides support for core Bluetooth layers and protocols to Linux-based internet of things (IoT) devices.

  • Osquery: Using D-Bus to query systemd data

    During my summer internship at Trail of Bits I worked on osquery, the massively popular open-source endpoint monitoring agent used for intrusion detection, threat hunting, operational monitoring, and many other functions. Available for Windows, macOS, Linux, and FreeBSD, osquery exposes an operating system as a high-performance relational database, which allows you to write SQL-based queries to explore operating system data.

    My initial task was to port osquery’s startup_items table to Linux. Since the startup_items table is only available on macOS and Windows, we wanted to port it to Linux while keeping the current schema. Porting to Linux is complicated, though; like macOS and Windows, Linux has an indefinite number of locations for startup items, so I needed to parse the data in each location and insert it into the table. This would have been fairly simple, but we couldn’t directly parse the data for the systemd location. Ultimately, we added systemd support to the table through the D-Bus API and created a brand-new table for systemd units.

  • Syslog-ng and Security Onion - Blog - syslog-ng Community - syslog-ng Community

    One of the most interesting projects utilizing syslog-ng is Security Onion, a free and open source Linux distribution for threat hunting, enterprise security monitoring, and log management. It is utilizing syslog-ng for log collection and log transfer and uses the Elastic stack to store and search log messages. Even if you do not use its advanced security features, you can still use it for centralized log collection and as a nice web interface for your logs. But it is also worth getting acquainted with its security monitoring features, as it can show you useful insights about your network. Best of all, Security Onion is completely free and open source, with commercial support available for it.

    From this blog, you can learn how to get started with Security Onion in evaluation mode. This does not mean any limitations, just a simplified setup where all services are installed on a single host. That said, for a production environment, a distributed installation is recommended instead.

Ransomware, Proprietary Software and Openwashing

Filed under
  • Facility services provider Spotless suffers ransomware attack

    Integrated facility services provider Spotless has been hit by ransomware, the company has confirmed.

  • The Best 10 Alternatives To Chromium Browser [Ed: Well, this article is terrible in the sense that it recommends "alternatives" that are even more malicious and proprietary software than Chromium itself!]

    Planning to switch to a highly secure and lightweight web browser? Your search ends here as this article will provide you with 10 best Chromium Chrome alternatives which are simple to use and packed with plenty of features.

    Indeed Google Chrome is a trusted and versatile web browser that is flooded with numerous extensions and features. However, this browser comes with many privacy concerns while being heavy on the system resources which can result in the low battery life of your device.

    The open-source browser project behind Google Chrome is Chromium which comes equipped with features related to media, security, and privacy. But if you wish to try some new and best chromium web browsers, you may want to check the below given options.

  • The 0,5 MB of nothing in all Apple Music files

    Have you ever bought a storage upgrade for your iPod, iPhone, or Mac to have more room for your Apple Music (formerly iTunes) digital music collection? You may have been filling it with gigabytes worth of empty space.

    The music files you purchase from the Apple Music Store (AMS; formerly the iTunes Music Store) contain approximately 6 % of the digital equivalent of nothingness. I’m not referring to silence, but continuous blocks of empty space set aside inside the files. It serves no purpose other than to pad the files to make them 0,5 MB larger. So why is Apple making music files unnecessarily large? and how do you recover the wasted space?

    This article is fairly technical, and the topics in it require a fair bit of explanation. You can skip the first 14 paragraphs if you’re only interested in the “why”, or skip the first 17 paragraphs for the “how.”

    Music files purchased from AMS is encoded with the Advanced Audio Codec (AAC) using the Apple AAC Encoder. The files are delivered in an ISOM/MPEG (ISO 14496-1) container. This container format is used for different media files including audio, pictures, and movies. The container format has lots of room for implementations to develop their own weird quirks.

  • The Linux Foundation and Fintech Open Source Foundation Announce Keynote Speakers for Open Source Strategy Forum 2020

    The Linux Foundation, the nonprofit organization enabling mass innovation through open source, along with co-host Fintech Open Source Foundation (FINOS), a nonprofit whose mission is to accelerate adoption of open source software, standards and best practices in financial services, today announced initial keynote speakers for Open Source Strategy Forum (OSSF). The event takes place virtually November 12 – 13 in the Eastern Standard Time (EST), UTC−05:00. The schedule can be viewed here and the keynote speakers can be viewed here.

  • Podcast Academy to Hold First-Ever Awards Show This Spring (Exclusive)

    The non-profit group has set a March 28 date for the first annual Awards for Excellence in Audio, nicknamed the Ambies. During the show, the Podcast Academy plans to hand out 23 awards that recognize a range of audio-first work. Winners will receive a gold statue holding a microphone and wearing headphones. (The Ambies has replaced earlier plans to call the awards the Golden Mics.)

    The date of the show will put the Ambies in a window when many of the entertainment industry's biggest awards shows, including the Grammys and the Academy Awards, typically take place. That was intentional, says executive director Michele Cobb, who notes that podcasting "is an entertainment medium just like all those others."

Security Leftovers

Filed under

  • libloc: Or what is working inside it

    This is a more in detail article about how libloc works internally. This might be slightly too tech-savvy for some readers, but it might still be a fun read if you would like to know more about the challenges and implementation of IPFire Location.

    When we started the project, it was immediately clear that the biggest challenge would be packing the data into the database efficiently so that it consumes as little space as possible and - at the same time - can be read as quickly as possible. This is required to make the library as versatile as possible and enable applications that we are not aware of yet (because you can never be too fast) and to scale down to the smallest systems that IPFire runs on.

    The internet is a big space. Four billion IPv4 addresses is nothing. The IPv6 address space is large, and so are the addresses. 128 bits are 16 bytes. Storing the full address for the already allocated address space would already be huge, but as the internet continues to grow at a fast pace, the database would very soon become bigger and bigger.

  • Intel Discloses New Ice Lake Xeon Security Features - Phoronix

    Intel today is revealing a few details concerning upcoming Intel 3rd Generation Xeon Scalable "Ice Lake" processors.

  • Capsule8 Wins “Endpoint Security Innovation of the Year” Award From CyberSecurity Breakthrough
  • Google warns of severe 'BleedingTooth' Bluetooth flaw in Linux kernel
  • Microsoft October 2020 Patch Tuesday fixes 87 vulnerabilities

    Microsoft has released today its monthly batch of security updates known as Patch Tuesday, and this month the OS maker has patched 87 vulnerabilities across a wide range of Microsoft products.

Canonical Releases New Ubuntu Kernel Security Updates to Patch 10 Vulnerabilities

Filed under

The new Ubuntu kernel security updates are available for all supported Ubuntu Linux releases, including Ubuntu 20.04 LTS (Focal Fossa), Ubuntu 18.04 LTS (Bionic Beaver), and Ubuntu 16.04 LTS (Xenial Xerus), and all supported architectures and flavors, including 32-bit, 64-bit, arm, kvm, gcp, gke, aws, oracle, azure, and oem.

Affecting all supported Ubuntu releases and kernel flavors, a use-after-free vulnerability (CVE-2020-16119) discovered by Hador Manor in Linux kernel’s DCCP protocol implementation could allow local attacker to cause a denial of service (system crash) or possibly execute arbitrary code.

Read more

Syndicate content

More in Tux Machines

Raspberry Pi Compute Module 4

  • Gumstix Introduces CM4 to CM3 Adapter, Carrier Boards for Raspberry Pi Compute Module 4

    Raspberry Pi Trading has just launched 32 different models of Raspberry Pi CM4 and CM4Lite systems-on-module, as well as the “IO board” carrier board. But the company has also worked with third-parties, and Gumstix, an Altium company, has unveiled four different carrier boards for the Raspberry Pi Compute Module 4, as well as a convenient CM4 to CM3 adapter board that enables the use of Raspberry Pi CM4 on all/most carrier boards for the Compute Module 3/3+.

  • Raspberry Pi CM4 and CM4Lite Modules Launched for $25 and Up

    We were expecting Raspberry Pi Compute Module 4 sometimes next year, but Raspberry Pi Trading Limited managed to launch the new module much earlier, as Raspberry Pi CM4 and CM4Lite modules have just been launched with a new, much more compact form factor incompatible with the earlier Compute Modules, an I/O board making use of the new features, and a choice of 32 models with variations in terms of memory and storage capacity, as well as the presence or lack thereof of a WiFi and Bluetooth wireless module.

Kernel: UNIX Time, Bluetooth Bug, Char/Misc and Intel

  • Linux 5.10 Solves the Year 2038 Problem Till Year 2486

    The Year 2000 problem was one of the most severe issues in programs of computerized systems that created havoc in computers and affecting systems worldwide. A little background on why this problem emerged — Ever noticed when a computer or a website asks you to enter the last two digits of the year? Computers are programmed to store only the last two digits of years because it saves storage space (Four digits Vs. Two digits). Say there’s only one day left in the year 1999 (99); a day later, the systems would fail to understand if it’s the Year 2000 (00) or 1900 (00).

  • Linux 5.9.1 And Older Stable Kernel Updates Fixing "Bleeding Tooth" Bluetooth Vulnerability Are Available - LinuxReviews

    BleedingTooth is a really bad and in theory very serious Linux kernel vulnerability. It allows someone within Bluetooth range to potentially execute code on your Linux machine thanks to a combination of improper input validation, improper buffer restrictions and improper access control in the BlueZ libraries and heap-based type confusion in the Linux kernel's L2CAP code. The practical threat isn't all that. Linux 5.9.1 as well as updates to the older "stable" kernel series (5.8.16, 5.4.72, 4.19.152, 4.14.202, 4.9.240, and 4.4.240) have been released with a patch by Intel's Luiz Augusto von Dentz addressing the Linux kernel side of the BleedingTooth vulnerability. You should upgrade to one of those if your machine has a Bluetooth adapter (most laptops do). 

  • Char/Misc With Linux 5.10 Brings Nitro Enclaves, Alder Lake, More Code For Gaudi - Phoronix

    The "char/misc" area within the Linux kernel continues to have a bit of everything as the "catch all" pull request of the kernel not fitting into other existing subsystems.  [...] - Qualcomm's MHI bus added in Linux 5.7 supports more features with Linux 5.10 albeit mostly lower-level changes.  - The Intel-owned Habana Labs continues working extensively on their upstream kernel driver supporting their AI inference and training accelerators. With Linux 5.10 is a wide range of improvements to the Habana Labs kernel code largely on the Gaudi side.  - The SoundWire code has gained support for run-time power management, including within the Intel SoundWire support paths. The Intel code also adds multi-link support and other improvements. 

  • Linux 5.10 Continues Bringing Up Support For Intel's Rocket Lake - Phoronix

    Building off Linux 5.9 that featured initial support for Gen12 graphics on next year's Rocket Lake desktop platform along with other early enablement for Rocket Lake like RAPL support and other PCI ID additions, that work has continued for the Linux 5.10 cycle.  The libata pull adds Rocket Lake PCH-H RAID PCI IDs as one of the additions.  There is also the platform-drivers-x86 work for Linux 5.10 where Rocket Lake support is added to the intel_pmc_core driver.  While the DRM code in Linux 5.9 brought initial support for Rocket Lake building off the existing Gen12 code, the DRM code for Linux 5.10 also has necessary code changes for properly driving displays with the hardware. 

Android Leftovers

Graphics: Vulkan, Intel and NVIDIA

  • Vulkan 1.2.158 Released With Fragment Shading Rate Extension - Phoronix

    Vulkan 1.2.158 was released this morning with two notable extensions introduced. First up is VK_KHR_fragment_shading_rate that allows changing the rate at which fragments are shaded. Multiple pixels can be shaded now by a single fragment shader invocation. The new extension allows controlling the fragment shading rate on a per-draw, per-primitive, or per-region basis. Most notably this can be used by Vulkan-powered games for shading higher levels of detail in a scene compared to others. Or rather lower quality shading in some areas of the scene.

  • Linux 5.10 Continues Bringing Up Support For Intel's Rocket Lake - Phoronix

    Building off Linux 5.9 that featured initial support for Gen12 graphics on next year's Rocket Lake desktop platform along with other early enablement for Rocket Lake like RAPL support and other PCI ID additions, that work has continued for the Linux 5.10 cycle. The libata pull adds Rocket Lake PCH-H RAID PCI IDs as one of the additions. There is also the platform-drivers-x86 work for Linux 5.10 where Rocket Lake support is added to the intel_pmc_core driver.

  • GCC's Ada Frontend Seeing More Work On NVIDIA CUDA Support - Phoronix

    Should you want to use the Ada programming language for GPU programming, the GCC compiler has been working on CUDA support within its front-end for this safety and security minded language. In the past born out of academia there's been CUDA Ada bindings. There has also been Ada/SPARK GPU programming initiatives in the past with various APIs. This latest still ongoing effort is wiring up the GCC Ada front-end with CUDA support.

  • You may want to avoid Linux Kernel 5.9 if you want fully supported NVIDIA drivers | GamingOnLinux

    On the official NVIDIA forum, an employee put out an announcement warning NVIDIA GPU owners that the Linux Kernel 5.9 and later is currently unsupported. It's worth noting they posted that in the CUDA forum, so other workloads like gaming may work as normal. In the post they mention Kernel 5.9+ is currently "incompatible" with any of their drivers, and they're suggesting to wait until "mid-November" for a fresh NVIDIA driver update which is expected to bring support for it. They're "working diligently" to get ready to support it.