Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, every security mechanism should be reviewed to validate it is applicable, i.e. I had a vulnerable version of node running but I wasn't using the particular aspect of node so it was a non-issue (and amazingly, IT sec agreed!).

But in the case of io_uring, it was outright bypassing other security layers. And while we all like to think we're running trusted services/code, we have to think about supply-chain attacks that may surprise us, or zero days, etc.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: