<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kubernetes on schristoph.online</title><link>https://schristoph.online/tags/kubernetes/</link><description>Recent content in Kubernetes on schristoph.online</description><generator>Hugo</generator><language>en-us</language><copyright>Stefan Christoph. All rights reserved.</copyright><lastBuildDate>Tue, 05 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://schristoph.online/tags/kubernetes/index.xml" rel="self" type="application/rss+xml"/><item><title>The 732-Byte Wake-Up Call</title><link>https://schristoph.online/blog/the-732-byte-wake-up-call/</link><pubDate>Tue, 05 May 2026 00:00:00 +0000</pubDate><guid>https://schristoph.online/blog/the-732-byte-wake-up-call/</guid><description>&lt;p>Security is not a phase you pass through on the way to production. It is a permanent condition.&lt;/p>
&lt;p>On April 29, 2026, a security research team published a vulnerability that works on every Linux distribution shipped since 2017. Not most. Every. The exploit is a single Python script. It is 732 bytes long. It requires no race conditions, no kernel-specific offsets, no special privileges beyond a local user account. One script, every distro, every time. They called it Copy Fail [1].&lt;/p></description></item></channel></rss>