Treasure@feddit.org to Linux@lemmy.ml · edit-22 months agoUnauthenticated RCE vs all GNU/Linux systems to be fully disclosed in 2 weeks with no working fix yetnitter.poast.orgexternal-linkmessage-square29fedilinkarrow-up192arrow-down14file-textcross-posted to: privacy@lemmy.mlcybersecurity@sh.itjust.works
arrow-up188arrow-down1external-linkUnauthenticated RCE vs all GNU/Linux systems to be fully disclosed in 2 weeks with no working fix yetnitter.poast.orgTreasure@feddit.org to Linux@lemmy.ml · edit-22 months agomessage-square29fedilinkfile-textcross-posted to: privacy@lemmy.mlcybersecurity@sh.itjust.works
minus-squarenarc0tic_bird@lemm.eelinkfedilinkarrow-up47·2 months agoLet’s see if this really affects all Linux systems or if the stars need to align for this to actually be exploitable.
minus-squareFangedWyvern42@lemmy.worldlinkfedilinkarrow-up12·2 months agoI still remember hearing about a Ring 0 exploit in Windows (I may be misremembering, though) that required Ring 0 access. I think if an attacker has access to Ring 0, you’re already screwed anyway.
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up12arrow-down1·2 months agoI agree, all this attention grabbing sound to me as if this is actually not a big deal. But we will see i guess.
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up10·2 months agoA 9.9 is pretty bad no matter what. They wouldn’t rank it almost a 10 if it was some obscure bug that is very hard to exploit. With that being said it is hard to know without details
Let’s see if this really affects all Linux systems or if the stars need to align for this to actually be exploitable.
I still remember hearing about a Ring 0 exploit in Windows (I may be misremembering, though) that required Ring 0 access. I think if an attacker has access to Ring 0, you’re already screwed anyway.
I agree, all this attention grabbing sound to me as if this is actually not a big deal. But we will see i guess.
A 9.9 is pretty bad no matter what. They wouldn’t rank it almost a 10 if it was some obscure bug that is very hard to exploit.
With that being said it is hard to know without details