If this is true (or at least plausible to the relevant people), the author of that Twitter post will probably be on the radar of any shady government agency worldwide. Not a nice situation to be in.
It supposedly affects all GNU/Linux systems, there’s no fix, existed for 10 years, severity of 9.9, but there’s an “easy workaround”.
I’m curious.easy workaround
Turn the power off?
Me too, I’m looking forward to the writeup.
Unauthenticed RCE vs all GNU/Linux systems
So this would probably be SSH related right? Otherwise what would all Linux systems have in common?
Not all Linux’s have SSH enabled, especially out of the box.
They have some other posts about IPv6 parsing (also not universal), but that doesnt sound like an “easy” RCE.
If it were SSH though, wouldn’t that ALSO include a wider blast radius than just Linux systems?
Like OpenSSH is used all over the damn place, unless I guess there’s something specific about the issue that limits it to Linux hosts for some reason?
He claims the blast radius is bigger, not just Linux. He also claims to be in talks with Apple. So the educated guess would still be openssh
My bet is on Systemd.
That’s not all GNU/Linux though. Either the OP doesn’t understand a very common container OS, Alpine, doesn’t use systemd (also Void Linux and others outside the container space) or it’s something else.
Oh that would be baaaad
And unsurprising
How would this be unsurprising? Is systemd known for this kind of thing or something?
Okay, who’s giving odds on this one coming anywhere close to living up to its billing?
The claims are well into the “I found a unicorn” territory, I’m tipping its either “If you misconfigure this, its unsafe”, or its a real vuln, and its significantly harder to exploit that they are claiming.