GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Sunday, 21-Jul-2024 04:00:40 JST翠星石翠星石
    in reply to
    • nekobit
    @neko Pretty much ClownStrike doesn't do any testing on their patches and send out a dodgy "threat signature" file to almost all of the windows computers that are part of their botnet.

    They have a windows kernel module written in sepples, which parses "threat signature" files with a ".sys" extension and applies them and someone went and tested in production by pushing one or more corrupted "threat signature" file(s), which caused the parser to de-reference a null-pointer and caused the NT kernel to crash.

    I do wonder if de-referencing a NULL pointer in a Linux module will cause it to crash - I guess I better try it out.

    https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/ (do not run the JavaScript on the page - it is all useless malware that doesn't do anything useful).
    In conversationSunday, 21-Jul-2024 04:00:40 JST from freesoftwareextremist.compermalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.crowdstrike.com
      Technical Details: Falcon Update for Windows Hosts | CrowdStrike
      from @CrowdStrike
      Learn more about the technical details around the Falcon update for Windows hosts.
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.