- Thread Starter
- #26
Oh well, we shall have to see if re-writing everyting in Rust is the solution. I wonder how that's coming along? 
A possible "dreaming scenario": important parts of FreeBSD like Jails and Capsicum will be checked and declared secure (more feasible than in Linux); then all the rest of services and applications will be built/adapted composing these parts. This will reduce a lot the escalation of security problems in non-safe code. A bad video will break ffmpeg output but not the system, and it will be self-sabotage...Oh well, we shall have to see if re-writing everyting in Rust is the solution. I wonder how that's coming along?![]()
"A flaw in OpenBSD's TCP SACK implementation dating back to 1999. A signed integer overflow allowing remote denial-of-service. The kind of bug that survived hundreds of reviews, dozens of major releases, thousands of pairs of eyes. Still there.
A defect in FFmpeg's H.264 decoder, 16 years old. A sentinel collision causing an out-of-bounds write. Automated tools never caught it. Not for lack of trying: 5 million fuzz tests. Zero results. Mythos found it by analyzing the code directly."
Although it doesn't say so, what would have impressed me would be if it only found ONE bug in openbsd... we don't know the full number, of course.
"The model chained multiple Linux kernel vulnerabilities to build a full privilege escalation path, defeating hardened protections: stack canaries, KASLR, W^X. Not an isolated flaw. A working attack chain.
On FreeBSD, Mythos autonomously identified and exploited a 17-year-old remote code execution vulnerability in the NFS service. Unauthenticated root access. Fully autonomous. No human steering.
And then there's this: against Firefox 147, the model successfully developed JavaScript shell exploits 181 times. Claude Opus 4.6, the previous best model? Twice."
I'm thinking a bit of both, maybe biased towards hype.Hmm, so the jury is out. Either they do have something real... or this is all hype and an attempt at a kind of 'protection racket' to try to get a funding stream from corporates. Or perhaps a bit of both.
Yes, iSCSI is a better example, if they had found an exploit in that, that would have been more significant.
I'm thinking a bit of both, maybe biased towards hype.
Honestly, look at NFS. Does anyone run NFS over the public internet or do you use it on your home network (isolated) or work network (again isolated)? If an exploit is not a "remote" exploit, then you start needing more physical access, so there are other concerns that need breaking before the exploit can happen.
Well, I guess you're right, I expect there's lots of it out there..NFS is in much more common use than iSCSI, though.
NFS with Kerberos (as I understand the exploit is only against NFS with Kerberos) might be a different matter.
LAN is a relative term. There are a lot of devices such as video streamers, cameras and wifi hubs that are easily taken over and could attack an NFS server on the LAN.
They should all be isolated. Anything that runs proprietary or unchecked firmware should be isolated.