OpenBSDOvjeren akaunt

@openbsd

OpenBSD is a free and secure UNIX-like operating system that emphasizes portability, standardization, correctness, proactive security & integrated cryptography.

Vrijeme pridruživanja: rujan 2018.

Tweetovi

Blokirali ste korisnika/cu @openbsd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @openbsd

  1. 28. sij

    (ERRATA) An incorrect check allows an attacker to trick mbox delivery into executing arbitrary commands as root and lmtp delivery into executing arbitrary commands as an unprivileged user.

    Poništi
  2. 28. sij

    (ERRATA) smtpd can crash on opportunistic TLS downgrade, causing a denial of service.

    Poništi
  3. 15. sij

    (ERRATA) Execution Unit state was not cleared on context switch with Intel Gen9 graphics hardware.

    Poništi
  4. 30. pro 2019.

    Theo joins TheBrothers WISP for an interview about everything OpenBSD.

    Poništi
  5. 19. pro 2019.

    (ERRATA) ripd fails to validate authentication lengths.

    Poništi
  6. 19. pro 2019.

    (ERRATA) ftp will follow remote redirects to local files.

    Poništi
  7. 17. pro 2019.

    Comment to ARM: Responsible disclosure doesn't mean "downplay to avoid damage to the bottom line." The responsibility aspect entails ensuring all customers are aware of the defect. What happened here is indistinguishable from Intel's behavior, and that's not the look you want.

    Prikaži ovu nit
    Poništi
  8. 17. pro 2019.

    This was fixed quietly and without responsible disclosure by ARM in Linux mainline a year ago, but rediscovered independently by Anthony Steinhauser.

    Prikaži ovu nit
    Poništi
  9. 17. pro 2019.

    (ERRATA) ARM64 CPUs speculatively execute instructions after ERET.

    Prikaži ovu nit
    Poništi
  10. 11. pro 2019.

    (ERRATA) ld .so may fail to remove the LD_LIBRARY_PATH environment variable for set-user-ID and set-group-ID executables in low memory conditions.

    Poništi
  11. proslijedio/la je Tweet

    Claudio Jeker thinks about security holistically. It impacts all of his work, like the and OpenBGPD projects. We love this approach and that's why we're presenting him with the Radiant Award! Thanks to for funding his $10k gift!

    Poništi
  12. 8. pro 2019.

    (ERRATA) A user can log in with a different user's login class.

    Poništi
  13. 8. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    4. pro 2019.

    Qualys researchers discovered an authentication-bypass vulnerability (CVE-2019-19521) in OpenBSD's authentication system. Special thanks to Theo de Raadt and the OpenBSD developers for a very quick response: they published patches in <40 hours.

    Prikaži ovu nit
    Poništi
  15. 4. pro 2019.

    (ERRATA) xenodm uses the libc authentication layer incorrectly.

    Poništi
  16. 4. pro 2019.

    (ERRATA) libc's authentication layer performed insufficient username validation.

    Poništi
  17. 4. pro 2019.

    (ERRATA) Environment-provided paths are used for dlopen() in mesa, resulting in escalation to the auth group in xlock(1).

    Poništi
  18. 27. stu 2019.
    Poništi
  19. 21. stu 2019.

    (ERRATA) Shared memory regions used by some Mesa drivers had permissions which allowed others to access that memory.

    Poništi
  20. 21. stu 2019.

    (ERRATA) A local user could cause the system to hang by reading specific registers when Intel Gen8/Gen9 graphics hardware is in a low power state. A local user could perform writes to memory that should be blocked with Intel Gen9 graphics hardware.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·