Opens profile photo
Follow
๐•ƒ๐•–๐•  ๐”ป๐•š ๐”ป๐• ๐•Ÿ๐•’๐•ฅ๐•  ๐Ÿฏ
@leodido
Security ๐Ÿ›ก๏ธ eBPF ๐Ÿ Kernel ๐Ÿชž K8s ๐Ÿ•ธ Languages ๐Ÿ› ๏ธ OSS ๐Ÿ’ž โ— I make ๐Ÿฆ…๐Ÿ”ฌ โ— bpfcov ๐Ÿ kubectl-trace ๐Ÿ•ต๏ธโ€โ™‚๏ธ go-syslog ๐Ÿ“‘ etc. โ— Tweets my own โœ‹ โ—‹ โ—‹ โ—‹
๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡ฎ๐Ÿ‡นleodido.devJoined April 2007

๐•ƒ๐•–๐•  ๐”ป๐•š ๐”ป๐• ๐•Ÿ๐•’๐•ฅ๐•  ๐Ÿฏโ€™s Tweets

"[โ€ฆ] series of #BPF blog entries by looking at observing userspace, and how this can be facilitated by adding Userspace Static Defined Tracing (USDT) probes to a library or program [โ€ฆ] USDT tracing example that uses those mechanisms." #Linux #kernel
19
CVE-2022-43995 is really something. Sudo 1.8.0 through 1.9.12 contains an array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by local users with access to Sudo by entering a password of 7 chars or fewer. github.com/sudo-project/s
Image
Image
3
321