Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agoCritical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comexternal-linkmessage-square5fedilinkarrow-up125arrow-down14
arrow-up121arrow-down1external-linkCritical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwidecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agomessage-square5fedilink
minus-squareSayCyberOnceMore@feddit.uklinkfedilinkEnglisharrow-up8·1 month agoSkimming through the Qualsys report it seems that the attacker would already need access to the device first, to be able to crash the processes and then collect the hashes, so I’d say this vulnerability appears to need chaining with other(s)?
Skimming through the Qualsys report it seems that the attacker would already need access to the device first, to be able to crash the processes and then collect the hashes, so I’d say this vulnerability appears to need chaining with other(s)?