aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorXe Iaso <me@xeiaso.net>2024-07-30 11:24:14 -0400
committerXe Iaso <me@xeiaso.net>2024-07-30 11:25:33 -0400
commit98c6a71dc38228b27517cf90e2eebd67e176c9e6 (patch)
tree032d09ea0f76d5c157223ccee77264b78db244a4
parent0b582f983de2dbfeb71bd0865cdd2740ff3ba442 (diff)
downloadxesite-98c6a71dc38228b27517cf90e2eebd67e176c9e6.tar.xz
xesite-98c6a71dc38228b27517cf90e2eebd67e176c9e6.zip
CVE-2024-5535
Signed-off-by: Xe Iaso <me@xeiaso.net>
-rw-r--r--lume/src/shitposts/no-way-to-prevent-this/CVE-2024-5535.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/lume/src/shitposts/no-way-to-prevent-this/CVE-2024-5535.md b/lume/src/shitposts/no-way-to-prevent-this/CVE-2024-5535.md
index 03db46e..4c7c85d 100644
--- a/lume/src/shitposts/no-way-to-prevent-this/CVE-2024-5535.md
+++ b/lume/src/shitposts/no-way-to-prevent-this/CVE-2024-5535.md
@@ -1,6 +1,6 @@
---
title: '"No way to prevent this" say users of only language where this regularly happens'
-date: 2024-06-27
+date: 2024-07-30
series: "no-way-to-prevent-this"
type: blog
hero:
@@ -9,10 +9,10 @@ hero:
prompt: A forlorn business man resting his head on a brown wall next to a window.
---
-In the hours following the release of [CVE-2024-5535](https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html) for the project [OpenSSL](https://openssl.org/), site reliability workers
-and systems administrators scrambled to desperately rebuild and patch all their systems to fix NPN (the precursor to ALPN) in OpenSSL 1.0.x, 1.1.x, and 3.x leaking 255 bytes of client heap to the server with every write. This is due to the affected components being
+In the hours following the release of [CVE-2024-5535](https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html) for the project [OpenSSL](https://openssl-library.org/), site reliability workers
+and systems administrators scrambled to desperately rebuild and patch all their systems to fix a memory safety vulnerability allowing 255 bytes of the client's heap to be sent to the server when using Next-Protocol-Notifications (commonly used for HTTP/2 connections). This vulnerability has existed since 2011. This is due to the affected components being
written in C, the only programming language where these vulnerabilities regularly happen. "This was a terrible tragedy, but sometimes
-these things just happen and there's nothing anyone can do to stop them," said programmer Ms. Carrie Kuhn, echoing statements
+these things just happen and there's nothing anyone can do to stop them," said programmer Miss Josefina Terry, echoing statements
expressed by hundreds of thousands of programmers who use the only language where 90% of the world's memory safety vulnerabilities have
occurred in the last 50 years, and whose projects are 20 times more likely to have security vulnerabilities. "It's a shame, but what can
we do? There really isn't anything we can do to prevent memory safety vulnerabilities from happening if the programmer doesn't want to