Tag: glibc

  • Hacker News: Understanding DNS Resolution on Linux and Kubernetes

    Source URL: http://jpetazzo.github.io/2024/05/12/understanding-kubernetes-dns-hostnetwork-dnspolicy-dnsconfigforming/ Source: Hacker News Title: Understanding DNS Resolution on Linux and Kubernetes Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an in-depth analysis of DNS resolution mechanisms in Linux and Kubernetes, specifically addressing a warning message regarding excess nameservers. This is a crucial topic for professionals dealing with Kubernetes…

  • Hacker News: A deep dive into Linux’s new mseal syscall

    Source URL: https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/ Source: Hacker News Title: A deep dive into Linux’s new mseal syscall Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the introduction of a new syscall called `mseal` in the Linux kernel that implements a memory sealing protection mechanism. It highlights how `mseal` differs from previous memory protection…

  • Slashdot: How WatchTowr Explored the Complexity of a Vulnerability in a Secure Firewall Appliance

    Source URL: https://it.slashdot.org/story/24/10/20/1955241/how-watchtowr-explored-the-complexity-of-a-vulnerability-in-a-secure-firewall-appliance?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How WatchTowr Explored the Complexity of a Vulnerability in a Secure Firewall Appliance Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a recent vulnerability discovered in Fortinet’s FortiGate SSLVPN appliance, analyzed by cybersecurity startup Watchtowr. It highlights the implications of the vulnerability and the challenges faced…

  • Slashdot: How WatchTowr Explored the Complexity of Vulnerability in a Secure Firewall Appliance

    Source URL: https://it.slashdot.org/story/24/10/20/1955241/how-watchtowr-explored-the-complexity-of-vulnerability-in-a-secure-firewall-appliance Source: Slashdot Title: How WatchTowr Explored the Complexity of Vulnerability in a Secure Firewall Appliance Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a cybersecurity startup, Watchtowr, which has identified a vulnerability in Fortinet’s FortiGate SSLVPN appliance that could potentially lead to remote code execution. The analysis highlights the…

  • Hacker News: Hardening C Against ROP: Getting CET Shadow Stacks Working

    Source URL: https://x86.lol/generic/2024/09/23/user-shadow-stacks.html Source: Hacker News Title: Hardening C Against ROP: Getting CET Shadow Stacks Working Feedly Summary: Comments AI Summary and Description: Yes Summary: This text elaborates on the use of CET (Control-flow Enforcement Technology) shadow stacks in Linux environments to enhance security by mitigating memory unsafety issues. It provides a practical guide on…