GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 25-Sep-2024 04:16:15 JST Kevin Beaumont Kevin Beaumont

    Regarding the Linux RCE thing doing the rounds from Twitter: https://cyberplace.social/@GossiTheDog/113194080852739654

    In conversation about 8 months ago from cyberplace.social permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Kevin Beaumont (@GossiTheDog@cyberplace.social)
      from Kevin Beaumont
      @dangoodin@infosec.exchange there’s no technical details at all, it’s just people panicking without knowing what they’re panicking about, which InfoSec peeps are very good at and usually ends poorly. There’s nothing actionable.
    • GreenSkyOverMe (Monika) repeated this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 04:24:14 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Regarding the "unspecified Linux vulnerability" that the author has been "hyping the shit out of" (their words) all week -

      It's accidentally leaked, due to an unpaid open source maintainer making a boo boo.

      It's in CUPS, a printing subsystem. It isn't Linux specific.

      CUPS isn't faced much to the internet, I've checked and done a Shodan Safari. It also isn't installed by default on Linux server installs for almost all distros.

      It's not a big deal, update packages are dropping, don't panic.

      In conversation about 8 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.boo.it
        B O O c o m m u n i c a t i o n s
        BOO is a Multimedia Factory dedicated to the development and implementation of creative marketing strategies. BOO works to structure every client's message for maximum impact in new media. BOO communications è una multimedia factory dedicata allo sviluppo di prodotti pubblicitari in versione digitale, opera nel settore packaging, web design, architettura grafica destinata all'advertising.

      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 04:37:01 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Pouring one out for the unpaid open source maintainers dealing with this stuff for the past few weeks.

      I notice the person tweeting about it has turned off their replies on the tweets.

      In conversation about 8 months ago permalink
      GreenSkyOverMe (Monika) repeated this.
    • Embed this notice
      MemoryLeech (cyberleech@cyberplace.social)'s status on Friday, 27-Sep-2024 05:05:39 JST MemoryLeech MemoryLeech
      in reply to

      @GossiTheDog

      https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/

      In conversation about 8 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.evilsocket.net
        Attacking UNIX Systems via CUPS, Part I
        from Simone Margaritelli
        Hello friends, this is the first of two, possibly three (if and when I have time to finish the Windows research) writeups. We will start with targeting GNU/Linux systems with an RCE. As someone who’s
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 06:33:38 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Re the “Linux RCE” story, I’d like to point the press breathlessly covering this to one minor (sarcasm) detail for exploitation: “A potential victim attempts to print from the malicious device”

      My thoughts on how this has played out: https://www.linkedin.com/posts/kevin-beaumont-security_open-source-has-many-unpaid-volunteers-who-activity-7245168546840793088-3N7A?utm_source=share&utm_medium=member_ios

      In conversation about 8 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/113/205/995/254/463/212/original/6cbd5d767c94d4e1.jpeg
      2. Domain not in remote thumbnail source whitelist: media.licdn.com
        Kevin Beaumont on LinkedIn: Open source has many unpaid volunteers who power the world’s technology.…
        Open source has many unpaid volunteers who power the world’s technology.. and have to deal with InfoSec people treating them like this during vulnerability…
      Haelwenn /элвэн/ :triskell: repeated this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 07:03:53 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Redhat’s advisory is worth a read if you want calm actual analysis: https://www.redhat.com/en/blog/red-hat-response-openprinting-cups-vulnerabilities

      In conversation about 8 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.redhat.com
        Red Hat’s response to OpenPrinting CUPS vulnerabilities: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176 and CVE-2024-47177
        An overview and mitigation information for the vulnerabilities affecting OpenPrinting CUPS.
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 07:17:05 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Also; all the press articles I’ve seen on this have taken the word of the vulnerability finder as gospel - they haven’t actually fact checked it.

      Eg none of the CVEs are CVSS score 9.9. Or close.

      The sole source in articles shouldn’t be a known bully. The story is probably more how this played out so it doesn’t happen again.

      In conversation about 8 months ago permalink
    • Embed this notice
      feld (feld@friedcheese.us)'s status on Friday, 27-Sep-2024 07:22:39 JST feld feld
      in reply to
      @GossiTheDog so it's not an RCE on "all GNU/Linux systems"? Color me shocked :monocle:
      In conversation about 8 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 07:54:17 JST Kevin Beaumont Kevin Beaumont
      in reply to

      In the researchers PoC video they casually don't show that the victim user needs to print to the malicious print queue first, it's not in the video. Minor detail.

      In conversation about 8 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 27-Sep-2024 08:08:44 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The media are going to have to go back and rewrite or delete the articles here.. it’s not labelled Critical, it’s not a 9.9 etc etc.

      I think there’s probably lessons to be learned here around how vulns are covered.

      In conversation about 8 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/113/206/369/225/963/871/original/28ca2a71476f31e6.jpeg
    • Embed this notice
      Fellows (fellows@cyberplace.social)'s status on Friday, 27-Sep-2024 08:17:56 JST Fellows Fellows
      in reply to

      @GossiTheDog if it doesn’t have a crappy graphic you made with Paint, I tend not to worry!

      In conversation about 8 months ago permalink
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Saturday, 28-Sep-2024 00:37:29 JST Will Dormann Will Dormann
      in reply to

      @GossiTheDog
      Was it a "boo boo"?

      We're all better off because of the leak, so we should probably thank whoever was at fault. 😂

      Think about the alternate universe of having gone through an additional week and a half of self-amplifying media hype. 😬

      In conversation about 8 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.