Random insights of our daily work
Our last blog post on Linux mount namespaces explored ways to restrict access to the file system. In this post we'll show how to restrict access to the network.
Lately we've been facing strange build errors on one of our build servers. The root cause was quite surprising.
Linux offers a variety of mechanisms to confine a process, one of them are namespaces. Today they are mostly used as foundation for Linux containers. In this blog post we'll demonstrate how namespaces can be used to restrict access to the file system for a given process and all its children.
Understanding certain kernel internals is not only useful for persons that intend developing kernel related software.
An overview about x86 firmware security and Heads, a project aiming to gain more trust in the boot process.
ALPSS 2022 took place again and here's what happened
This blog post gives an overview of EROFS vs. SquashFS and tries to compare them with a simple benchmark.
In 2021 we switched to ProtonMail and figured the hard way that it is not the right thing for us.
After a two years long break the Summit on a Summit was back in early June this year.
Simple questions often have not so simple answers. One example is the question is, what priority does this process have?
Squashfs-tools recently fixed a security issue. In this blog post we show how to re-exploit it and how it got mitigated
ALPSS was back in 2021 and here's what happened :-)
If Startups invest money into security right from the scratch, the costs will be much lower in the end. Why? Read this article!
The upcoming Yocto 3.4 release will contain a small contribution by us. Over the last two years we learned to love EROFS, so we decided to add support for it to Yocto.
Imagine you find yourself in a restricted environment and you need some Linux rootfs that runs on the embedded system you just managed get access to. Of course the CPU architecture of the embedded system is not the same as your workstation. The circumstances are further complicated by the fact that the userspace should offer enough tooling to build a C/C++ application. In such a situation docker can help, but in an unexpected way.
In this blog post we will take a closer look at a symlink race vulnerability from 2018 in docker. We think the vulnerability is quite interesting since it is easy to exploit but not so obvious to find while reviewing. Attentive readers may ask themselves whether they’d have noticed the issue while developing or reviewing the affected lines of code.
+43 5 9980 400 00 (email preferred)
sigma star gmbh
Eduard-Bodem-Gasse 6, 1st floor
6020 Innsbruck | Austria