• pastermil@sh.itjust.works
      link
      fedilink
      arrow-up
      4
      ·
      8 hours ago

      Really?

      I thought it’s great, since those exploits didn’t just come from thin air. It would be bad if someone got their hands on a zero-day and managed to do something catastrophic, like shutting down airports, or blowing up a power plant.

      Also, it’s not like they’re losing money over this.

    • Excel@lemming.megumin.org
      link
      fedilink
      English
      arrow-up
      14
      ·
      22 hours ago

      These kind of exploits have always been common. The only thing that changed is people talking about them.

    • StrawberryPigtails@discuss.tchncs.de
      link
      fedilink
      arrow-up
      20
      arrow-down
      2
      ·
      1 day ago

      I fell it’s going to be a bad couple of months for everybody, not just Linux. It’s just with open source, it’s easier for the LLMs to find things that have been missed. And more open when they do because you can see the bug reports.

      • [object Object]@lemmy.ca
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        1 day ago

        On the bright side though I think security is an afterthought and it needs to be the default on internet facing software.

        That a hacker hasn’t bothered to look except the lowest hanging sql injections isn’t enough.

        And, I know vibe coding gets a deserved bad rap, but you can ask an AI to test out your security or point out obvious holes you might not know to look for.

    • Quibblekrust
      link
      fedilink
      English
      arrow-up
      10
      ·
      22 hours ago

      First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.

      It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.

      • blobjim [he/him]@hexbear.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 hours ago

        ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.

    • reluctant_squidd@lemmy.ca
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 day ago

      I think it’s best to read the actual docs published by the research when available. News tells some, but I have seen it sensationalized a few times, where it only affects x kernel with y module before update z.

      That being said, these are seemingly getting more and more frequent as previously noted.

  • mecen@lemmy.ca
    link
    fedilink
    arrow-up
    1
    ·
    1 day ago

    If it was backdoor that means someone created it maliciously or it is bug?

    • Gagootron@feddit.org
      link
      fedilink
      arrow-up
      8
      ·
      24 hours ago

      It is a tool to establish persistente after the server is already hacked. This isn’t a way to break into a server.