Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
UNIX famously uses fork+exec to create processes, a simple API that is nevertheless quite tricky to use correctly and that comes with a bunch of problems. The alternative, spawn, as used by VMS, Windows NT and recently POSIX, fixes many of these issues but it overly complex and makes it hard to add new features.
prepare() is a proposed API to simplify process creation. When calling prepare(), the current thread enters “preparation state.” T ... ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Explanation from author https://news.ycombinator.com/item?id=43484120
Actual implementation is in the rust repo. I found the node binding to be the easiest to follow.
https://lobste.rs/s/fm08m8/extism\_make\_all\_software\_programmable was posted here before with overall negative feedback.
[Comments](https://lobste.rs/s/ ... ⌘ Read more
tl;dr: Though Oracle denies it, a hacker produced valid data from Oracle customers.
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
If you’d prefer reading to watching, here’s a link to the same section in the transcript:
changelog.fm/631#transcript-36
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Related to https://lobste.rs/s/9c875g/chunking\_attacks\_on\_tarsnap\_others
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
I haven’t seen this posted yet here so I figured I’d share, this is _not_ blogspam, and I am _not_ affiliated with Wiz. This is a real CVE for
ingress-nginx
. Not to be confused with nginx-ingress
which appears to be not vulnerable in the same way.Comments ⌘ Read more
Luckily, they have since released a bugfix release to unbreak them.
https://setuptools.pypa.io/en/latest/history.html#v78-0-2
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
What are you doing this week? Feel free to share!
Keep in mind it’s OK to do nothing at all, too. ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more
Comments ⌘ Read more