It’s easy to judge from external perspective. Nonetheless this vulnerability seems egregious to me. Execute user supplied code with root privilege?? Were corners cut due to schedule limitations?...
It’s easy to judge from external perspective. Nonetheless this vulnerability seems egregious to me. Execute user supplied code with root privilege?? Were corners cut due to schedule limitations? There needs to be an internal postmortem because this standard is not acceptable.
It’s easy to judge from external perspective. Nonetheless this vulnerability seems egregious to me. Execute user supplied code with root privilege?? Were corners cut due to schedule limitations? There needs to be an internal postmortem because this standard is not acceptable.