Hacker News
- Impact of Shared Code on Vulnerability Patching https://www.umiacs.umd.edu/~tdumitra/blog/2015/04/15/impact-of-shared-code-on-vulnerability-patching/ 2 comments
- Remote Code Execution Security Patch for Unity. https://www.reddit.com/r/gamedev/comments/6ufcyq/remote_code_execution_security_patch_for_unity/ 26 comments gamedev
- Symantec says to disable PCAnywhere until the patch is released because of source code breach http://www.ccl-la.com/blog/index.php/alert-symantec-says-disable-pcanywhere-software-until-patch-is-released/ 7 comments sysadmin
- Reddit's markdown code. spez says that patches are welcome. http://webpy.org/track/browser/markdown.py 20 comments programming
- How Our Engineering Team Used Python's AST to Patch 100,000s of Lines of Code https://engineering.soroco.com/abstract-syntax-tree-for-patching-code-and-assessing-code-quality/ 114 comments programming
- New Slack Remote Code Execution Patched https://portswigger.net/daily-swig/slack-vulnerability-allowed-attackers-to-smuggle-malicious-files-onto-victims-devices 9 comments netsec
- Patching Yourself into Windows Code Integrity: Part 1 https://github.com/Avery3R/re-writeups/blob/master/windows-ci/part1_on_disk_patching.md 3 comments lowlevel
- [PATCH 0/2] code of conduct fixes https://lkml.org/lkml/2018/10/7/12 13 comments linux
- MS15-078, Remote Code Execution in all versions of Windows. No patch for 2K3. https://technet.microsoft.com/library/security/ms15-078 142 comments netsec
- 400k servers may be at risk of serious code-execution attacks. Patch now [Exim] https://arstechnica.com/information-technology/2018/03/code-execution-flaw-in-exim-imperils-400k-machines-have-you-patched/ 10 comments linux
- Intel patches remote code-execution bug that lurked in chips for 10 years https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/ 16 comments intel
- CVE-2014-6271 (Bash Code Injection Vulnerability) workaround for incomplete patch https://access.redhat.com/articles/1200223 4 comments netsec
- Patching a program without source code: How to be like the Skype hacker for newbies http://www.codexon.com/posts/patching-a-program-without-source-code-how-to-be-like-the-skype-hacker-for-newbies 23 comments programming
- Remote Desktop Services Remote Code Execution Vulnerability (CVSS Score 9.8) so severe Microsoft Patching XP and Server 2003 https://www.reddit.com/r/sysadmin/comments/bom77a/remote_desktop_services_remote_code_execution/ 52 comments sysadmin
- Drupal critical flaw: Patch this remote code execution bug urgently, websites warned https://www.zdnet.com/article/drupal-critical-flaw-patch-this-remote-code-execution-bug-urgently-websites-warned/ 8 comments linuxadmin
- Intel patches remote code execution bug that lurked in CPUs for 10 years. https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/ 8 comments crypto
- Position Independent Code & Windows Loader/PE Header - How does it patch absolute far calls? https://www.reddit.com/r/learnprogramming/comments/4wdsns/position_independent_code_windows_loaderpe_header/ 6 comments learnprogramming
- Linux 101: Compiling and patching source code for extra features http://www.linuxvoice.com/linux-101-how-to-compile-software/ 5 comments linux
- IE Zero day exploit code released - no patch yet from Microsoft. http://koresecure.com/?p=4090 27 comments technology
- Lutris 0.5 only supports GNOME: users of other DEs have to patch the code to remove GnomeDesktop dependency https://github.com/lutris/lutris/blob/master/lutris/util/display.py#L219 11 comments linux_gaming
- Patch released for Nexus 3000 & 5000 switches to remove hard-coded root credentials http://www.csoonline.com/article/3040406/security/cisco-issues-critical-patch-for-nexus-switches-to-remove-hardcoded-credentials.html#tk.rss_news 4 comments sysadmin
- Fully patched Internet Explorer menaced by a whopping 4 code-execution bugs http://arstechnica.com/security/2015/07/fully-patched-internet-explorer-menaced-by-a-whopping-4-code-execution-bugs/ 40 comments windows
- Google goes public with more Windows bugs - "After reporting a flaw, Project Zero starts a 90-day clock, then automatically publicly posts details and sample attack code if the bug has not been patched." http://www.computerworld.com/article/2870967/google-goes-public-with-more-windows-bugs.html 13 comments technology
- Given a security patch, can you automatically reverse-engineer the security vulnerability that is being patched and create exploit code to exploit it before it's globally patched? http://www.schneier.com/blog/archives/2008/04/reverseengineer.html 13 comments netsec
- I wish old games would release the source code so that fans can make fan patches to keep old games alive. None 11 comments opensourcegames
- Golly! Linux Code Patched to Replace F-Bombs in Comments With 'Hugs' https://www.lightreading.com/open-source/industry-bodies-groups/golly!-linux-code-patched-to-replace-f-bombs-in-comments-with-hugs/d/d-id/747993 7 comments technology
- The latest BU 1.0.1.2 patch pull request have been made public for your consultation. Please review the code if you are qualified and report any critical bug found privately to BU dev. https://github.com/BitcoinUnlimited/BitcoinUnlimited/pull/390 11 comments btc
- (FYI, via the Reg) Patch NOW: VMware vCenter, ESXi can be pwned via your network Remote-code execution danger on VM hosts http://www.theregister.co.uk/2015/10/01/vmware_patches/ 32 comments sysadmin
- MS15-034: Remote code execution in IIS, specifically in http.sys which runs in kernel mode. You may want to patch now. https://support.microsoft.com/en-us/kb/3042553 90 comments sysadmin
- Load-time code patching for CPU features etc. https://github.com/servo/html5ever/blob/e6c9cc1c457bade010226e510ca7806fa061215e/src/util/smallcharset/x86_64.rs 8 comments rust
- Crysis 2 DX11 patch was coded to favor Nvidia cards and wastes hojillions of polygons for no visual improvement http://techreport.com/articles.x/21404 3 comments reddit.com
- patch applied (ghc): Implement SSE2 floating-point support in the x86 native code generator (#594) http://www.haskell.org/pipermail/cvs-ghc/2010-february/052474.html 3 comments haskell
- PATCH NOW - Hackers are mass-scanning the Internet in search of VMware servers with a newly disclosed code-execution vulnerability that has a severity rating of 9.8 out of a possible 10. CVE-2021-21974 https://www.vmware.com/security/advisories/VMSA-2021-0002.html 211 comments sysadmin
- Developers with Canonical pushed out a handful of patches this week, including one that resolves a bug that could have let an attacker cause a denial of service or execute arbitrary code with a TCP payload https://threatpost.com/linux-systemd-bug-could-have-led-to-crash-code-execution/126605/ 3 comments linux
- Comedy Gold! Luke-jr denying his Bitcoin blacklist patch that was controversially implemented in Gentoo in 2014 was a "blacklist" despite his own code and quotes proving him wrong! https://np.reddit.com/r/Bitcoin/comments/6iibwg/why_does_the_new_york_agreement_rely_on_miner/dj6quoq/?context=3 45 comments btc
- AMD Sends Out Patches For New AMDGPU DAL Display Driver, Adds 93k Lines Of Code:Enabling new DAL display driver for amdgpu on Carrizo and Tonga https://lists.freedesktop.org/archives/dri-devel/2016-february/100524.html?utm_source=anzwix 5 comments linux
- Apple failed to patch Rootpipe Mac OS X Yosemite vulnerability but claimed they did. Didn't port patch to OS X 10.9 and below because it was too much work. Any code in any privilege level can gain root access. http://thehackernews.com/2015/04/rootpipe-mac-os-x-vulnerability.html 14 comments technology
- Extremely critical crypto flaw in iOS may also affect fully patched Macs. Coding blunder that exposed sensitive data may still be putting users at risk. http://arstechnica.com/security/2014/02/extremely-critical-crypto-flaw-in-ios-may-also-affect-fully-patched-macs/ 5 comments programming
- "They Write the Right Stuff" by Charles Fishman, originally published on 31 December 1996 in Fast Company: "[Y]ou can't have people freelancing their way through software code that flies a spaceship, and then, with peoples lives depending on it, try to patch it once its in orbit." http://www.fastcompany.com/28121/they-write-right-stuff 23 comments technology
- "They Write the Right Stuff" by Charles Fishman, originally published in Fast Company on 31 December 1996: "[Y]ou can't have people freelancing their way through software code that flies a spaceship, and then, with peoples lives depending on it, try to patch it once its in orbit." http://www.fastcompany.com/28121/they-write-right-stuff 13 comments business