-
if OpenSMTPD was a rugby match ...Gilles would have scored 7 tries and converted them, but missed a tackle and one try against the team. hell of a scoreline and contribution... Thanks
@PoolpOrg for your huge commitment and great contribution to#BSD in#OpenSMTPD Merci Mon Amis https://twitter.com/PoolpOrg/status/1224497218457153537 … -
I'll take a break then work on other projects which are less stressful and that are more compatible with my new life.
#OpenSMTPD keeps a special place in my heart and I will continue helping as I can.Prikaži ovu nit -
I've been the maintainer of
#OpenSMTPD for the last +10 years. During that time, I took some very good decisions and some very bad decisions, I also wrote some very cool code and some shitty bugs. I've decided to resign today from this role and be a simple contributor.Prikaži ovu nit -
The mitigations discussed in my article after the CVE on
#OpenSMTPD were implemented for some and are either discussed or being implemented for others. It sucks, shit happens, this is the life of software.Prikaži ovu nit -
Serious Security – How ‘special case’ code blew a hole in
#OpenSMTPD:#Patch now before you receive a… http://dlvr.it/RPKQFF@RedSeal_copic.twitter.com/CvP8thw7OJ
-
Admins: patch your
#OpenSMTPD implementations, if you have them. There's a remote code execution vuln now in play. https://buff.ly/2Sl9asi#cybersecurity -
https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/ … nice writeup and response/dissection of the
#OpenSMTPD bug discoverd by#Qualys -
Critical
#OpenSMTPD#Bug Opens#Linux and OpenBSD Mail Servers to#Hackers:https://thehackernews.com/2020/01/openbsd-opensmtpd-hacking.html … -
CVE-2020-7247. Patch or kill the daemon.
#OpenSMTPD#OpenBSDhttps://www.theregister.co.uk/2020/01/30/openbsd_mail_bug/ …Prikaži ovu nit -
More excellent work by Qualys.
#OpenSMTPD command injection (CVE-2020-7247) https://www.openwall.com/lists/oss-security/2020/01/28/3 … Here's a rudimentary local root exploit for OpenBSD. https://github.com/bcoles/local-exploits/blob/master/CVE-2020-7247/root66 …pic.twitter.com/2XoutYSC7C
-
Remotely Exploitable Root Vulnerability In
#OpenSMTPD Disclosed. You absolutely have to upgrade to OpenSMTPD 6.6.2p1 if you are running a e-mail server using OpenSMTPD. OpenSMTPD is a default on#FreeBSD and it is also available on#linux and *BSDs). https://linuxreviews.org/Remotely_Exploitable_Root_Vulnerability_In_OpenSMTPD_Disclosed … -
"To overcome these limitations, we drew inspiration from the Morris worm"
#openbsd#opensmtpd https://www.openwall.com/lists/oss-security/2020/01/28/3 … -
Patch
#OpenBSD#OpenSMTPD Remote Code Execution Vulnerability (CVE-2020-7247) https://www.mail-archive.com/misc@opensmtpd.org/msg04850.html … -
Unpleasant vulnerability in
#OpenSMTPD https://lwn.net/Articles/810882/ … -
This
#opensmtpd#vulnerability is seriously critical, allowing remote code execution. Check the blog post to see how#qualyshelps detecting, assessing, monitoring and prioritizing the remediation, empowering your operational effic…https://lnkd.in/dhCy_Qt https://lnkd.in/dbT3UBX -
How to detect and remediate the
#OpenBSD#OpenSMTPD remote code execution vulnerability (CVE-2020-7247) discovered by Qualys https://blog.qualys.com/laws-of-vulnerabilities/2020/01/29/openbsd-opensmtpd-remote-code-execution-vulnerability-cve-2020-7247 …#rce -
Kritische Sicherheitslücke in OpenSMTPD erlaubt(e) Codeausführung aus der Ferne https://www.heise.de/security/meldung/Kritische-Sicherheitsluecke-in-OpenSMTPD-erlaubt-e-Codeausfuehrung-aus-der-Ferne-4648501.html …
#OpenSMTPD#Security -
I just pushed patched
#OpenSMTPD to#AlpineLinux edge and v3.11. Packages should be available on mirrors in few minutes. If you're running OpenSMTPD 6.6.1p1, upgrade immediately!https://twitter.com/opensmtpd/status/1222288467046076417 …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.