Re: This is quite interesting
I'm by no means an expert in these things but from what I have read is this the chronology?
A co founder of scio security http://www.linkedin.com/companies/scio-security
discovers a flaw in ubuntu and puts it on twitter at 6.42am on 8th July. I assume he also previously told ubuntu about it, but I can't see anything like that. I assume he's done that to drum up business of some sort.
The H then reports that the patch had "already" been released (apparently the previous day when I got it by automatic update). https://lists.ubuntu.com/archives/ub...ly/001117.html
Yes, it seems a good illustration that there can be vulnerabilities in ubuntu but in publishing it after it's been fixed doesn't it mean that particular horse has probably already bolted? Alternatively isn't it a good illustration also of how quickly these things get fixed?
No doubt you will correct me if I'm wrong, but doesn't the use of ssh mean the attacker has to have achieved remote login first?
I'm by no means an expert in these things but from what I have read is this the chronology?
A co founder of scio security http://www.linkedin.com/companies/scio-security
discovers a flaw in ubuntu and puts it on twitter at 6.42am on 8th July. I assume he also previously told ubuntu about it, but I can't see anything like that. I assume he's done that to drum up business of some sort.
The H then reports that the patch had "already" been released (apparently the previous day when I got it by automatic update). https://lists.ubuntu.com/archives/ub...ly/001117.html
Yes, it seems a good illustration that there can be vulnerabilities in ubuntu but in publishing it after it's been fixed doesn't it mean that particular horse has probably already bolted? Alternatively isn't it a good illustration also of how quickly these things get fixed?
No doubt you will correct me if I'm wrong, but doesn't the use of ssh mean the attacker has to have achieved remote login first?
Comment