kid

joined 2 years ago
MODERATOR OF
[–] kid@sh.itjust.works 1 points 3 weeks ago

Edited. Thanks!

[–] kid@sh.itjust.works 3 points 6 months ago

Sorry. It was not paywalled for me when I first saw. More info from different source: https://feedly.com/cve/CVE-2025-6545

[–] kid@sh.itjust.works 4 points 6 months ago

The incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was:

  1. A new feature added to Service Control on May 29, 2025, without adequate error handling.
  2. The policy change with blank fields was globally replicated and caused Service Control binaries to crash.
[–] kid@sh.itjust.works 2 points 6 months ago

Thanks! Corrected

[–] kid@sh.itjust.works 9 points 6 months ago

The first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.

[–] kid@sh.itjust.works 2 points 9 months ago (1 children)

Leak extortion is the main issue nowadays, not covered by backups, I'm afraid.

[–] kid@sh.itjust.works 6 points 10 months ago

!selfhosted@lemmy.world to the win!

[–] kid@sh.itjust.works 4 points 10 months ago

I didn't know about that tool. Apparently, it is a CDR, which I like very much. I'm not aware of any good open-source implementations.

view more: next ›