openbsdnow's profile picture. Unofficial OpenBSD news, updates and thoughts.

Mastodon: http://bsd.network/@openbsdnow.

#OpenBSD #WhyOpenBSD #RunBSD #PlayOnBSD #CallForTesting

OpenBSD Now! (@[email protected])

@openbsdnow

Unofficial OpenBSD news, updates and thoughts. Mastodon: http://bsd.network/@openbsdnow. #OpenBSD #WhyOpenBSD #RunBSD #PlayOnBSD #CallForTesting

Is there an "OpenBSD Journal" in Mastodon? // CC: @openbsdjournal


OpenBSD Now! (@[email protected]) reposted

OPENBSD_7_2 bluhm@ modified sys/dev/wscons/wsemul_vt100*: Add a few missing bounds checks when processing terminal escape sequences. Without them, the kernel could be made to crash or reboot after receiving some specially crafted terminal escape sequences. from miod@; Reported...


OpenBSD Now! (@[email protected]) reposted

New OpenBSD 7.2 syspatch for amd64: 021_wscons


OpenBSD Now! (@[email protected]) reposted

Privilege drop, privilege separation, and restricted-service operating mode in OpenBSD undeadly.org/cgi?action=art… #openbsd #privsep #privdrop #security


Nice article about setting up Nextcloud and honk on OpenBSD with httpd(8) and relayd(8). x61.sh/log/2023/02/20… #nextcloud


OpenBSD Now! (@[email protected]) reposted

OPENBSD_7_2 bluhm@ modified usr.sbin/smtpd/envelope.c: smtpd(8) could abort due to a connection from a local, scoped ipv6 address. avoid using inet_pton(3) which doesn't support scoped ipv6 address, and use getaddrinfo(3) instead of. from semarie@; OK millert@ florian@ kn@ thi...


OpenBSD Now! (@[email protected]) reposted

OPENBSD_7_2 bluhm@ modified xserver/Xi/exevents.c: Xi: fix use-after-free in DeepCopyPointerClasses CVE-2023-0494, ZDI-CAN-19596 from matthieu@ this is errata/7.2/019_xserver.patch.sig


OpenBSD Now! (@[email protected]) reposted

OPENBSD_7_2 bluhm@ modified lib/libcrypto/x509/x509_genn.c: Fix arbitrary memory read in GENERAL_NAME_cmp() The ASN.1 template for GENERAL_NAME and its corresponding C structure disagree on the type of the x400Address member. This results in an ASN.1 string to be considered as...


Akvorado receives flows (currently Netflow/IPFIX and sFlow), enriches them with interface names (using SNMP), geo information (using MaxMind), and exports them to Kafka, then ClickHouse. Demo: demo.akvorado.net Source code: github.com/akvorado/akvor…

openbsdnow's tweet image. Akvorado receives flows (currently Netflow/IPFIX and sFlow), enriches them with interface names (using SNMP), geo information (using MaxMind), and exports them to Kafka, then ClickHouse. 

Demo: demo.akvorado.net

Source code: github.com/akvorado/akvor…
openbsdnow's tweet image. Akvorado receives flows (currently Netflow/IPFIX and sFlow), enriches them with interface names (using SNMP), geo information (using MaxMind), and exports them to Kafka, then ClickHouse. 

Demo: demo.akvorado.net

Source code: github.com/akvorado/akvor…

OpenBSD Now! (@[email protected]) reposted

OPENBSD_7_2 bluhm@ modified usr.bin/ssh/compat.c: fix double-free caused by compat_kex_proposal(); bz3522 from djm@; by dtucker@; ok djm@


OpenBSD Now! (@[email protected]) reposted

New OpenBSD 7.2 syspatch for amd64: 017_sshd


"A TCP packet with destination port 0 that matches a pf divert-to rule could crash the kernel."


Errata patches for TCP have been released for OpenBSD 7.1 and 7.2. openbsd.org/errata71.html openbsd.org/errata72.html


Loading...

Something went wrong.


Something went wrong.