You better call that number op, I think google might be compromised.
>>57977580
Other urls found in this thread:
owasp.org
cyberciti.biz
yourownlinux.com
cyberciti.biz
theverge.com
vocativ.com
theguardian.com
selinuxproject.org
cyberciti.biz
falkvinge.net
twitter.com
>exploit
>requires direct access to filesystem to execute
Wow, it's fucking nothing
Linux shills at full force today
In their defence this doesn't happen on Linux desktops because nobody really uses them.
So, you'd rather have an unpatchable system vulnerability and not know if it ever really got patched because you're using a proprietary operating system? Doesn't seem like a secure OS to me.
>unpatchable system vulnerability
Hey Linux foundation! You have unpatchable system vulnerability I can delete /etc/shadow and gain access to root acount! PATCH THIS RIGHT NOWWWWWWWWWWW!!!!!!!!!!!!!!
You're just jealous that Richard Stallman personally pays me to shill for Linux on Sup Forums
I'd rather have 5 million lines of code nobody reviews except for people with intentions of harm and have a heartbleed bug.
You're a retard, just be quiet.
owasp.org
>Below is the revised code from Github:
hbtype = *p++; n2s(p, payload); if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC 6520 sec. 4 */ pl = p;
cyberciti.biz
yourownlinux.com
Ad hominem are surely going to make Microsoft patch system vulnerabilities.