linux kernel security

Alibabacloud.com offers a wide variety of articles about linux kernel security, easily find your linux kernel security information here online.

Overview of Linux kernel security features

Address: https://www.linux.com/learn/docs/727873-overview-of-linux-kernel-security-features Editor's Note: This is a guest post from James Morris, the Linux kernel security subsystem maintainer and manager of the mainline

Linux and Security "Linux kernel Design and implementation" chapter--20135227 Huang

processes. Kernel (System State, enter kernel space execution, run in process context), application process (user state, go into user space execution, run in kernel space). The processor runs at any time in one of the following three states: Runs in user space, executes user processes, runs in kernel space, is in the

Measure the test taker's understanding about the intrusion detection system that enhances Linux kernel security.

LIDS (Linux Intrusion Detection System) is a Linux kernel patch and system management employee lidsadm. it enhances the Linux kernel. It implements a security mode in the kernel-referen

Familiar with Linux kernel Security Intrusion Detection System

LIDS (Linux Intrusion Detection System) is a Linux kernel patch and system management employee lidsadm. It enhances the Linux kernel. It implements a security mode in the kernel-referen

Use of Linux kernel Security Intrusion Detection System

Article Title: about the use of Linux kernel security intrusion detection system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel resear

Linux and Security "Linux kernel Design and implementation" Chapter III--20135227 Huang

the parent process. Most tasks are done by Do_exit ().Figure 143.5.1 Delete Process DescriptorAfter calling Do_exit (), the thread is zombie but retains its process descriptor. The process description characters of the child process is freed after the parent process obtains the terminated child process information, or it notifies the kernel that it is not concerned about that information.Wait () is the process that suspends calling it until one of th

Use of Linux kernel Security Intrusion Detection System

This section briefly introduces the Linux kernel security intrusion detection system and introduces the problems exposed by the Linux System and the features of the intrusion detection system. How can we complete a relatively high-level Linux

Brief Introduction to Linux kernel Security Intrusion Detection System

Linux Kernel security is gaining more and more attention with the popularity of Linux systems. Here we will introduce LIDS, the Linux kernel security intrusion detection system. Check w

Familiar with Linux kernel Security Intrusion Detection System

Article Title: familiar with Linux kernel security intrusion detection system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research,

Linux kernel prepend_path Function Security Restriction Bypass Vulnerability (CVE-2015-2925)

Linux kernel prepend_path Function Security Restriction Bypass Vulnerability (CVE-2015-2925)Linux kernel prepend_path Function Security Restriction Bypass Vulnerability (CVE-2015-2925) Release date:Updated on:Affected Systems:

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5206)

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5206) Release date:Updated on: Affected Systems:Linux kernelDescription:--------------------------------------------------------------------------------Bugtraq id: 69214CVE (CAN) ID: CVE-2014-5206Linux Kernel is the

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5207)

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5207) Release date:Updated on: Affected Systems:Linux kernelDescription:--------------------------------------------------------------------------------Bugtraq id: 69216CVE (CAN) ID: CVE-2014-5207Linux Kernel is the

Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-6666)

Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-6666)Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-6666) Release date:Updated on:Affected Systems:

Introduction to the Linux kernel--Network: TCP efficiency model and security issues

machine service will be full, so how to fully utilize the processing capacity of a single machine? Connection migration This kernel technology allows a server to simply handle TCP connection problems without being responsible for the business, thereby greatly improving the QPS of a single machine.Security issues with TCPThere are many security issues for the TCP protocol itself. For example, the agreement

Linux Kernel 'x86/entry/entry_64.S 'Local Security Restriction Bypass Vulnerability

Linux Kernel 'x86/entry/entry_64.S 'Local Security Restriction Bypass VulnerabilityLinux Kernel 'x86/entry/entry_64.S 'Local Security Restriction Bypass Vulnerability Release date:Updated on:Affected Systems: Linux

Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-3212)

Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-3212)Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-3212) Release date:Updated on:Affected Systems:

How to handle Linux kernel Security

Handling Linux kernel security details For computer users, the powerful functions of Windows have served a large number of users. However, the Windows security issue has caused a lot of headaches. Therefore, many people started to apply Linux, but the

Linux Kernel 'vdso _ addr () 'Function Local Security Restriction Bypass Vulnerability

Linux Kernel 'vdso _ addr () 'Function Local Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Linux kernel Description:Bugtraq id: 71990CVE (CAN) ID: CVE-2014-9585 Linux Kernel is the

Linux Kernel 'net _ ctl_permissions () 'Function Local Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Linux kernel Description:--------------------------------------------------------------------------------Bugtraq id: 64471CVE (CAN) ID: CVE-2013-4270 Linux Kernel is the Kernel of the Linux operating system. In the implementation of

Linux Kernel 'espfix64' dual-fault Security Restriction Bypass Vulnerability

Linux Kernel 'espfix64' dual-fault Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Linux kernelDescription:Bugtraq id: 71252 Linux Kernel is the Kernel of the

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.