Overview
- Red Hat
- Enterprise Linux 9
- OpenSSH
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.
and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.
Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.
Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
@r @ireneista it should be possible to package a secure messenger client in a stable linux distro like debian and have it still be usable 3+ years after release with only fixes for specific vulns backported.
and there should be a single digit number of these vulns, if any, if you designed your network and parsing architecture right.
Like, if you exclude DOSes and bugs in non-default features, CVE-2024-6387 is the last SSH vuln that I actually worry about. The last one of substance before that was the 2023 double-free that's not believed exploitable, then we get all the way back to CVE-2016-0777 and 0778 for another bad one.
Why can we not make a messenger with that kind of security record? One where running an early-2025 release today is perfectly safe?
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post