Treasure to Cybersecurity@sh.itjust.worksEnglish · edit-23 months agoUnauthenticated RCE vs all GNU/Linux systems to be fully disclosed in 2 weeks with no working fix yetnitter.poast.orgexternal-linkmessage-square19fedilinkarrow-up140arrow-down12file-textcross-posted to: privacy@lemmy.mllinux@lemmy.ml
arrow-up138arrow-down1external-linkUnauthenticated RCE vs all GNU/Linux systems to be fully disclosed in 2 weeks with no working fix yetnitter.poast.orgTreasure to Cybersecurity@sh.itjust.worksEnglish · edit-23 months agomessage-square19fedilinkfile-textcross-posted to: privacy@lemmy.mllinux@lemmy.ml
minus-squarekbal@fedia.iolinkfedilinkarrow-up15arrow-down1·3 months agoOkay, who’s giving odds on this one coming anywhere close to living up to its billing?
minus-squareCameronDev@programming.devlinkfedilinkEnglisharrow-up9·3 months agoThe claims are well into the “I found a unicorn” territory, I’m tipping its either “If you misconfigure this, its unsafe”, or its a real vuln, and its significantly harder to exploit that they are claiming.
minus-squareCameronDev@programming.devlinkfedilinkEnglisharrow-up2·3 months agohttps://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/ Definitely interesting
Okay, who’s giving odds on this one coming anywhere close to living up to its billing?
The claims are well into the “I found a unicorn” territory, I’m tipping its either “If you misconfigure this, its unsafe”, or its a real vuln, and its significantly harder to exploit that they are claiming.
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
Definitely interesting