>>57977580

You better call that number op, I think google might be compromised.

Other urls found in this thread:

owasp.org/index.php/Heartbleed_Bug
cyberciti.biz/faq/understanding-etcshadow-file/
yourownlinux.com/2015/08/etc-shadow-file-format-in-linux-explained.html?m=1
cyberciti.biz/tips/recovering-deleted-etcshadow-password-file.html
theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet
vocativ.com/295204/nsa-prism/
theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
selinuxproject.org/page/NB_AL
cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html
falkvinge.net/2013/11/17/nsa-asked-linus-torvalds-to-install-backdoors-into-gnulinux/
twitter.com/NSFWRedditGif

>exploit
>requires direct access to filesystem to execute
Wow, it's fucking nothing

Linux shills at full force today

In their defence this doesn't happen on Linux desktops because nobody really uses them.

So, you'd rather have an unpatchable system vulnerability and not know if it ever really got patched because you're using a proprietary operating system? Doesn't seem like a secure OS to me.

>unpatchable system vulnerability
Hey Linux foundation! You have unpatchable system vulnerability I can delete /etc/shadow and gain access to root acount! PATCH THIS RIGHT NOWWWWWWWWWWW!!!!!!!!!!!!!!

You're just jealous that Richard Stallman personally pays me to shill for Linux on Sup Forums

I'd rather have 5 million lines of code nobody reviews except for people with intentions of harm and have a heartbleed bug.

You're a retard, just be quiet.

owasp.org/index.php/Heartbleed_Bug
>Below is the revised code from Github:
hbtype = *p++; n2s(p, payload); if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC 6520 sec. 4 */ pl = p;
cyberciti.biz/faq/understanding-etcshadow-file/
yourownlinux.com/2015/08/etc-shadow-file-format-in-linux-explained.html?m=1

Ad hominem are surely going to make Microsoft patch system vulnerabilities.