PoC for CVE-2024-6387 in OpenSSH is out:
https://github.com/YassDEV221608/CVE-2024-6387_PoC
32-bit only...
PoC for CVE-2024-6387 in OpenSSH is out:
https://github.com/YassDEV221608/CVE-2024-6387_PoC
32-bit only...
WTAF. DigiCert are actively removing IPv6 support:
https://knowledge.digicert.com/alerts/digicert-certificate-status-ip-address
@skylark13 Hit the fork button and move on.
@ryanc Sounds like a DM bug. Tried rebooting them?
PSA: Wild speculation is the best speculation.
Rumours look to have been accurate, it looks like it's CUPS:
(Courtesy of an old friend at @watchtowrcyber)
Add in, runs as root and likely listens on the network.
If you wanted to speculate on the upcoming CVE in Linux distros, correlating Popcon with those that have listening parts and CVE data might be one way to make a prediction:
I wish Mastodon had the concept of drafts and/or scheduled posts but meantime, I've hacked together a solution of writing "Mentioned people" only posts and not mentioning anyone. Pretty it is not.
push(@fediverse, "Adversarial Architect"); # i hack in Perl#risk, #unix, #cisco, #security, #dataanalytics
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.