If you're reading the news lately, you might have stumbled on an article about an exploit code that could have been used by an attacker to bypass the security features of a GNU/Linux distribution, leaving the system vulnerable to drive-by attacks that can install backdoors, keyloggers, or another type of malware.
The said exploit was known to target a memory corruption vulnerability in the widely-used GStreamer multimedia framework, but the issue was patched upstream by Matthew Waters, a few hours after several media outlets reported the incident, and Collabora's Mark Filion was kind enough to inform us about the patch.
"Solves overreading/writing the given arrays and will error out if the streams asks to ... (read more)
from Softpedia News / Linux http://ift.tt/2gGORRr
via IFTTT
No comments:
Post a Comment