2910 shaares
55 private links
55 private links
13 results
tagged
linux-security
Suggests for improving Linux Kernel security, e.g. by converting redundant downstream kernel bug-fixing by vendors into greater upstream collaboration.
This article summarizes a size_t-to-int conversion vulnerability in Linux's files system layer exploited by creating, mounting, and deleting a deep directory structure.
traitor
checks for local misconfigurations and vulnerabilities and exploits them automatically to pop a root shell.
The author introduces an Ansible playbook for applying best practices for securing Linux servers.
This post takes a deep dive into several bugs inside the iSCSI subsystem of the Linux kernel.
This guide provides extensive information on hardening Linux.