Hírolvasó
A DSA Magyarországon: sok hűhó semmiért?
Tényleg jön az RCS üzenetküldés az iPhone-okra
Jöhet az okostelefon-használat korlátozása a közoktatásban
Az Apple is fejest ugrik az AI-ba, csak máshogy hívja
[$] P4TC hits a brick wall
perl v5.40.0 released
Security updates for Monday
Enged a nyomásnak a Microsoft a kémfunkciót illetően
Egyre kevesebbet nyomtatnak az emberek, és ez nem jó hír a HP-nak
Ha szeretsz repülni, november 19-re jegyed van a pilótafülkébe
A VoLTE és VoNR után ideje megbarátkozni az IVAS-sal
Akár ötezren chatelhetnek egyszerre a Messenger új közösségi funkciójával
Megvétózhatja az EU a PPF többmilliárd eurós üzletét
Hivatalos az optikai meghajtó nélküli Xbox Series X
Kernel prepatch 6.10-rc3
[$] Ladybird browser spreads its wings
Ladybird is an open-source project aimed at building an independent web browser, rather than yet another browser based on Chrome. It is written in C++ and licensed under a two-clause BSD license. The effort began as part of the SerenityOS project, but developer Andreas Kling announced on June 3 that he was "forking" Ladybird as a separate project and stepping away from SerenityOS to focus his attention on the browser completely. Ladybird is not ready to replace Firefox or Chrome for regular use, but it is showing great promise.
Linux nftables vulnerability exploited in the wild (CrowdStrike)
According to CrowdStrike, a vulnerability in the Linux kernel's nftables code that was discovered earlier this year is being actively exploited in the wild. The vulnerability allows for local privilege escalation. Most distributions have already released a fix.
As noted by the exploit developer, leveraging this POC is dependent on the kernel's unprivileged user namespaces feature accessing nf_tables. This access is enabled by default on Debian, Ubuntu and kernel capture-the-flag (CTF) distributions. An attacker can then trigger the double-free vulnerability, scan the physical memory for the kernel base address, bypass kernel address-space layout randomization (KASLR) and access the modprobe_path kernel variable with read/write privileges. After overwriting the modprobe_path, the exploit drops a root shell.[$] Modernizing BPF for the next 10 years
BPF was first generalized beyond packet filtering more than a decade ago. In that time, it has changed a lot, becoming much more capable. Alexei Starovoitov kicked off the second day of the BPF track at the 2024 Linux Storage, Filesystem, Memory Management, and BPF Summit by leading a session discussing which changes to BPF are going to come in the next ten years as it continues evolving. He proposed several ideas, including expanding the number of registers available to BPF programs, dynamic deadlock detection, and relaxing some existing limits of the verifier.