www.reddit.com/r/singapore/...
www.reddit.com/r/singapore/...
www.reddit.com/r/privacy/co...
www.reddit.com/r/privacy/co...
Does anyone know why? Any guess? Why pushing out recovery so far so early?
Does anyone know why? Any guess? Why pushing out recovery so far so early?
Curious to see what comes out of the inquiry.
Curious to see what comes out of the inquiry.
Specifiche: 2 istance Ubuntu 24.04 x86_64 con dnsmasq 2.90 e Nginx 1.24.0 (per il DOH) su infrastruttura cloud Oracle nella region di Milano.
Specifiche: 2 istance Ubuntu 24.04 x86_64 con dnsmasq 2.90 e Nginx 1.24.0 (per il DOH) su infrastruttura cloud Oracle nella region di Milano.
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.
Looks like this got caught by chance. Wonder how long it would have taken otherwise.
www.openwall.com/lists/oss-se...
It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…
Now I’m curious what it does in RSA_public_decrypt
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.