How Apple's Booboo Threatens to Destroy the GNU/Linux OS) - printf("%s ", argv[1]); + printf("%s ", argv[1]); exit(1); } - else printf("%s ", argv[3]); + printf("%s ", argv[3]); } }

That’s bad, right? --- hw/xfree86/common/xf86Init.c +++ hw/xfree86/common/xf86Init.c @@ -1677,7 +1677,7 @@ } if (!strcmp(argv[i], "-configure")) { - if (getuid() != 0 && geteuid == 0) { + if (getuid() != 0 && geteuid() == 0) { ErrorF("The '-configure' option can only be used by root. Back in 2006, the X server checked to make sure the user was root, but forgot to actually call the function. "); exit(1); } How is this possible? Also in OpenSSL and also from 2008, “OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.” --- lib/libssl/src/ssl/s3_srvr.c +++ lib/libssl/src/ssl/s3_srvr.c @@ -2009,7 +2009,7 @@ static int ssl3_get_client_certificate(S else { i=ssl_verify_cert_chain(s,sk); - if (!i) + if (i <= 0) { al=ssl_verify_alarm_type(s->verify_result); SSLerr(SSL_F_SSL3_GET_CLIENT_CERTIFICATE,SSL_R_NO_CERTIFICATE_RETURNED); Bypass validation of the certificate chain? Does nobody read the OpenSSL mailing list or the Debian bug tracker? Like “worst security bug you could possibly imagine” bad, right? “As a result, cryptographic key material may be guessable.” OK, I’m cheating here, it’s a three line fix. (). Continue reading.



Related Hacker News news



You may also be interested in Ferrari FDA Espionage Doge Climate Change Plotly Meg Whitman Engine