| ▲ | semiquaver 6 hours ago | ||||||||||||||||||||||||||||||||||||||||||||||||||||
“Made it into the wild?” Patches landed a month ago. Should they also wait until my linksys router from 2018 has a patch ready? | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | ori_b 6 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Patches are still in the process of landing in most major distros as of the time of this writing. Most users are not able to get an update through their distro's packaging mechanisms. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | SoftTalker 6 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
It's a local vulnerability at least. How many people do you let log in to your router? With the way linux is used these days, I'd guess the number of systems with untrusted local users is pretty limited. Even with shared hosting, you generally have root in your VM or container anyway. Unless this enables an escape from that? Still the risk that people who run "curl | bash" without care could get bitten, but usually its "curl | sudo bash" anyway... | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||