Security vulnerability found in Rust Linux kernel code
Posted by lelanthran 23 hours ago
Comments
Comment by jsiepkes 17 hours ago
Now what is kinda interesting is that instead of getting rid of the "unsafe" block the developers put in some extra check. I guess you can take the developer out of C but you can't take the C out of the developer?
Comment by aw1621107 21 hours ago
Comment by thesz 20 hours ago
Rust has troubles with STM because it lacks anything resembling effect system. Most probably, this will not be fixed.
Comment by dlahoda 13 hours ago
Comment by dizhn 21 hours ago
Comment by LukeShu 21 hours ago
Comment by arowthway 19 hours ago
Comment by megnu 19 hours ago
! Title: Hide Anubis Image
*/.within.website/x/cmd/anubis/static/img/*.webp$imageComment by sebtron 19 hours ago
Comment by jraph 18 hours ago
Comment by udjdndndjdjr 19 hours ago
Instead of using this to do some proof of work, why not just get the bot detector to mine bitcoin or something...
I mean it is just as useless... And at least the website gets some money back from the raw extraction of data now happening...
Edit: speeeeeling
Comment by dlahoda 13 hours ago
Comment by udjdndndjdjr 19 hours ago
Comment by pityJuke 22 hours ago
Comment by jeroenhd 21 hours ago
This "security vulnerability" is just a local DoS though. Annoying and problematic as it effectively bypasses controls over power on/off behaviour, but as far as I can tell from this report, no memory is leaked and no code execution can be achieved.
Comment by yourdetect 20 hours ago
Greg Kroah-Hartman's comment is both wrong and perplexing.
Comment by uhfraid 22 hours ago