6 votes

Topic deleted by author

1 comment

  1. [2]
    Comment deleted by author
    Link
    1. dootdoot
      Link Parent
      It’s easy to judge from external perspective. Nonetheless this vulnerability seems egregious to me. Execute user supplied code with root privilege?? Were corners cut due to schedule limitations?...

      It’s easy to judge from external perspective. Nonetheless this vulnerability seems egregious to me. Execute user supplied code with root privilege?? Were corners cut due to schedule limitations? There needs to be an internal postmortem because this standard is not acceptable.

      1 vote