frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Bun's experimental Rust rewrite hits 99.8% test compatibility on Linux x64 glibc

https://twitter.com/jarredsumner/status/2053047748191232310
262•heldrida•12h ago•282 comments

Internet Archive Switzerland

https://blog.archive.org/2026/05/06/internet-archive-switzerland-expanding-a-global-mission-to-pr...
483•hggh•10h ago•71 comments

I’ve banned query strings

https://chrismorgan.info/no-query-strings
187•susam•5h ago•96 comments

Zed Editor Theme-Builder

https://zed.dev/theme-builder
117•cuechan•4h ago•36 comments

Making your own programming language is easier than you think (but also harder)

https://lisyarus.github.io/blog/posts/making-your-own-programming-language.html
17•ibobev•2d ago•2 comments

Show HN: I made a Clojure-like language in Go, boots in 7ms

https://github.com/nooga/let-go
22•marcingas•4h ago•1 comments

CPanel's Black Week: 3 New Vulnerabilities Patched After Attack on 44k Servers

https://www.copahost.com/blog/cpanels-black-week-three-new-vulnerabilities-patched-after-ransomwa...
89•ggallas•5h ago•49 comments

Production engineering when trading billions of dollars a day [video]

https://www.youtube.com/watch?v=zR9PpXWsKFQ
47•abstrus•1d ago•11 comments

Distributing Mac software is increasing my cortisol levels

https://blog.kronis.dev/blog/apple-is-increasing-my-cortisol-levels
140•LorenDB•7h ago•87 comments

I caught the car

https://undecidability.net/senior/
17•holden_nelson•1h ago•15 comments

Google broke reCAPTCHA for de-googled Android users

https://reclaimthenet.org/google-broke-recaptcha-for-de-googled-android-users
1419•anonymousiam•1d ago•517 comments

LLMs corrupt your documents when you delegate

https://arxiv.org/abs/2604.15597
308•rbanffy•13h ago•120 comments

A recent experience with ChatGPT 5.5 Pro

https://gowers.wordpress.com/2026/05/08/a-recent-experience-with-chatgpt-5-5-pro/
573•_alternator_•19h ago•408 comments

Meta's embrace of A.I. is making its employees miserable

https://www.nytimes.com/2026/05/08/technology/meta-ai-employees-miserable.html
172•JumpCrisscross•3h ago•121 comments

The 90 Day disclosure policy is dead

https://blog.himanshuanand.com/2026/05/the-90-day-disclosure-policy-is-dead/
4•unknownhad•40m ago•0 comments

The hypocrisy of cyberlibertarianism

https://matduggan.com/the-intolerable-hypocrisy-of-cyberlibertarianism/
226•ColinWright•8h ago•170 comments

Using Claude Code: The unreasonable effectiveness of HTML

https://twitter.com/trq212/status/2052809885763747935
391•pretext•17h ago•232 comments

PipeDream on the Acorn Archimedes

https://stonetools.ghost.io/pipedream-archimedes/
67•msephton•7h ago•31 comments

The ROKR wooden typewriter: a closer look

http://writingball.blogspot.com/2026/05/the-rokr-wooden-typewriter-closer-look.html
23•speckx•2d ago•3 comments

Forking the Web

https://dillo-browser.org/lab/web-fork/
93•wrxd•10h ago•100 comments

OpenAI’s WebRTC problem

https://moq.dev/blog/webrtc-is-the-problem/
461•atgctg•2d ago•139 comments

Mythical Man Month

https://martinfowler.com/bliki/MythicalManMonth.html
329•ingve•2d ago•182 comments

FreeBSD: Local Privilege Escalation via Execve()

https://www.freebsd.org/security/advisories/FreeBSD-SA-26:13.exec.asc
51•Deeg9rie9usi•1h ago•43 comments

Random tie knots (2014)

https://tieknots.how/
7•surprisetalk•3d ago•1 comments

America's carpet capital: an empire and its toxic legacy

https://apnews.com/projects/pfas-forever-stained/
146•rawgabbit•3d ago•93 comments

How LEDs are made (2014)

https://learn.sparkfun.com/tutorials/how-leds-are-made/all
121•smig0•2d ago•20 comments

David Attenborough's 100th Birthday

https://www.bbc.com/news/articles/cp3pww9g0p5o
836•defrost•1d ago•158 comments

GrapheneOS fixes Android VPN leak Google refused to patch

https://cyberinsider.com/grapheneos-fixes-android-vpn-leak-google-refused-to-patch/
231•Georgelemental•8h ago•77 comments

All my clients wanted a carousel, now it's an AI chatbot

https://adele.pages.casa/md/blog/all-my-clients-wanted-a-carousel-now-it-s-an-ai-chatbot.md
132•edent•14h ago•59 comments

Removing fsync from our local storage engine

https://fractalbits.com/blog/remove-fsync/
56•zzsheng•2d ago•50 comments
Open in hackernews

FreeBSD: Local Privilege Escalation via Execve()

https://www.freebsd.org/security/advisories/FreeBSD-SA-26:13.exec.asc
51•Deeg9rie9usi•1h ago

Comments

rvz•1h ago
> IV. Workaround

> No workaround is available.

Oh dear.

itsthefrank•1h ago
> V. Solution

> Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date, and reboot the system.

Not everyone can just freebsd-update and reboot, so yes, "Oh dear." is a good response to this.

epcoa•1h ago
Anyone relying on a 30+ year old monolith kernel written in C to not have some exploitable LPEs lurking should stay in basket weaving and out of sysadmin.
itsthefrank•1h ago
Not sure why the snark but if people are running FreeBSD then they should be...basket weaving instead of using it? Yes, the correct solution is to patch and reboot but not everyone is in a place to jump and do that which is why a temp workaround, if possible, would be welcome
wswin•17m ago
I think good system should be prepared to do a reboot in a short notice. Even some long running jobs can have a pause mechanism.
cyberpunk•1h ago
Yep.

You should treat any system where non-admins regularly login as basically insecure/owned and rig your architecture appropriately.

TBH -- I don't have any of these kinds of boxes anymore. Who is really running anything like this in 2026 and for what purpose?

jmspring•53m ago
Stability of ecosystem. No systemd. Native ZFS. Jails over Docker. Been using it for 20+ years and it’s my preferred server OS.
cyberpunk•42m ago
No, I mean do you run FreeBSD boxes where users who should not ever assume root access actually login to do tasks?

My point is that if you do, you probably shouldn't run, for e.g applications which need production db credential, or hold sensitive data on these boxes, or .. whatever.

Edit: I use FreeBSD extensively, for various things -- but shell access to them is restricted to the sysadmins..

icedchai•40m ago
Same. I've been using it since 1996. Initially, we used it at an early ISP for DNS, SMTP, and POP3 for roughly 8K users, and it stuck with me.
bch•36m ago
>> monolith kernel written in C

> Who is really running anything like this in 2026 and for what purpose?

Am I parsing your question correctly?

cyberpunk•30m ago
No, I worded it badly. See below.
mrln•23m ago
Not necessarily FreeBSD, but for Linux this applies to most universities with a CS program, I think.

The systems should be cut off from sensitive administrative data, but a malicious student would at the very least have access to the other students' data with an LPE.

yjftsjthsd-h•18m ago
...as opposed to what, exactly? Linux is a 34 y.o. monolithic kernel in C, the BSDs are all forked from the same base (386BSD) of around the same age, XNU is 29 years old (and also heavily based on BSD code while also throwing in mach code) in C and other languages,...
skydhash•1h ago
Why can't they? Upgrading and rebooting is kinda the standard response for most security issues. So I would expect something like Ansible's playbooks for this exact scenario. You might also have it setup as a staggered rollout.
paulddraper•12m ago
What prevents it?
tptacek•19m ago
Does this vulnerability not rely on SUID binaries?
wolvoleo•11m ago
Why? Just update.
doublerabbit•1h ago
Linux is on their second and FreeBSD is on their first. How many is Windows on?
pjmlp•1h ago
Plenty, Microsoft has security teams whose job is to attack Windows.

Naturally they don't do blog posts about what they find.

hnlmorg•1h ago
You talk as if Windows is the only OS that has red teams attacking the system when clearly that isn’t even remotely true.
murderfs•29m ago
Local privilege escalation is largely irrelevant on Windows because basically no one uses it in a multi-user system, and application sandboxing is effectively nonexistent.
dwattttt•1h ago
If you think Linux is on their first or second, I'm not sure how or what you're counting.
doublerabbit•58m ago
> I'm not sure how or what you're counting.

The recent two. FailCopy and DirtyFrag and FreeBSD with Execve.

2 - Linux 1 - FreeBSD.

Of course, all OS have had past-time exploits. Three now have made the news.

dwattttt•37m ago
Your question was "how many high profile privilege escalations Windows has had recently" then? I can't think of any, 0?
gdgghhhhh•31m ago
https://nvd.nist.gov/vuln/detail/CVE-2026-21250
cyberpunk•1h ago
This is from April 28th, it was patched in 15.0R-p7.
itsthefrank•1h ago
-p8 is the current patch level for 15.0-RELEASE so if people have been keeping on top of patching this is already two reboots in the past.
loeg•1h ago
Just yesterday, cperciva was bragging about the FreeBSD approach to security: https://news.ycombinator.com/item?id=48056853 You can argue the response here was well coordinated, but having an LPE in a core syscall like execve() isn't ideal.
broken-kebab•47m ago
Or in other words, the response is well-coordinated so cperciva's bragging is justified, isn't it?
bch•42m ago
Its like rain on your wedding day - not actually ironic, just unfortunate.
stackghost•30m ago
A not-insignificant chunk of the userbase of the various BSDs is there because they were turned off of Linux after controversial things like Gnome 3, systemd being shoved down users' throats despite being a broken mess, wayland (though nobody was as arrogant about wayland as Poettering was about systemd), etc.

All that to say, the BSD userbase as a sizeable subset that are there for countercultural reasons, rather than technical. These are the people who buy into, say, OpenBSD's vaunted security reputation, or believe that "linux bad because reasons", so you're always going to get people in here bragging, because "not using linux" has become part of their identity.

I run a mix of FreeBSD and Linux on my personal devices. The ground truth is that FreeBSD is yet another unix-like OS written in C, and thus not immune from the types of bugs that stem from that lineage. None of the BSD distros are materially more secure or better than a properly-configured and patched Linux.

applfanboysbgon•25m ago
The person 'bragging' was not a countercultural user, but rather the FreeBSD engineering lead. But they were talking about FreeBSD's response to security vulnerabilities, in contrast to Linux's response.

> thus not immune from the types of bugs that stem from that lineage

They never claimed that FreeBSD didn't have vulnerabilities. I honestly have no idea why grandparent decided to bring up their comment when it exactly validates what the person they were criticising says. GP admits the response to the vulnerability was well-coordinated. The response to security vulnerabilities was the exact, and only, subject of the post they're calling out.

icedchai•25m ago
I also use a mix. I moved to FreeBSD initially after a rough period w/Linux in the late 90's. Today, my FreeBSD machines are all VMs running on Linux hosts!
cyberpunk•19m ago
Hah I'm your mirror version -- my linux machines are all VMs running on FreeBSD hosts!
wolvoleo•11m ago
Oh you use bhyve?

I've tried to use it but I dound it pretty difficult for systems that need a GUI. Maybe I should revisit.

cyberpunk•3m ago
Yep, most of my linuxes are headless -- but I do have a VM which I pass a graphics card through to for games and ai stuff though -- works really well (as long as you don't reboot the VM, it has a hard time attaching to the gfx card the second time for some reason, not looked into it much)

sysutils/vm-bhyve makes it quite friendly.

I wouldn't use it for work, though, just personal. Work is all enterprisey kubernetes stuff.

Edit: there is a 'proxmox-like' for FreeBSD out [0] -- I did try it on a couple machines and couldn't get the network working, but consoles seemed to work.. Kinda.

0: https://sylve.io

wolvoleo•12m ago
I wouldn't call it countercultural. And Wayland actually runs on freebsd these days.

I use Linux as well but I really like FreeBSD for a number of technical reasons. Like the ports collection, the jails, the first-class citizen ZFS.

And Gnome 3 doesn't really have anything to do with Linux. It is also available for FreeBSD if you want it (I don't, I hate the minimalist opinionated design style so I use KDE, also on Linux).

But I use Linux on servers where I run docker for example. It's not about "not using linux".

yjftsjthsd-h•23m ago
I think cperciva may have been a touch overenthusiastic, but surely this is in fact proving his point? His claim was, as you note before trying to ignore it, about coordination. When one of the recent Linux LPEs broke, the fix wasn't in distro packages yet; there was a vulnerability that users couldn't practically do anything about. This is an LPE that is fixed in the binaries that have already shipped. If I was playing cheerleader, this is exactly the case I'd use to argue that FreeBSD being a single unified system is a win and that its approach to handing security problems is very on top of things.
tptacek•20m ago
He was talking about managing disclosure and patch flow, and you're just taking it as an opportunity to dunk on him.
cryptbe•25m ago
Nice to randomly encounter our own work here.

Check out our blog post for a fun walkthrough: https://blog.calif.io/p/cve-2026-7270-how-i-get-root-on-free...

AI-generated working exploit, write-up and prompts: https://github.com/califio/publications/tree/main/MADBugs/fr...

tptacek•21m ago
Calif is just killing it these past couple months. Reminder that Calif is Thai Duong's new firm.
cryptbe•7m ago
You're always super kind to me :)
wolvoleo•15m ago
Oof that's a pretty big one, I didn't realise but I had already updated anyway.