Software Alternatives, Accelerators & Startups

New Linux udisks flaw lets attackers get root on major Linux distros

grsecurity Kata Containers
  1. Role-based access control system, least privilege memory protection, chroot restriction, etc.

    #Monitoring Tools #Security #Website Monitoring 6 social mentions

  2. Lightweight virtual machines that seamlessly plug into the containers ecosystem.
    Thomas, what are your thoughts on micro-vms such as kata containers? You can use them as a backend for docker in place of runc. I'm sure you're well aware, but for the readers, they are isolated with a CPU's VT instructions which are built to isolate VMS. I still think "containers don't contain" in a very Dan Walsh boston accent, but this seems like a respectable start. https://katacontainers.io.

    #Developer Tools #Containers As A Service #Cloud Computing 10 social mentions

Discuss: New Linux udisks flaw lets attackers get root on major Linux distros

Log in or Post with