Home Search
openbsd - search results
If you're not happy with the results, please do another search
RCE in OpenSMTPD library impacts BSD and Linux distros
At the technical level, the vulnerability is a "local privilege escalation" and "remote code execution" flaw that can be abused to run code remotely on a server that uses the OpenSMTPD client.
New vulnerability lets attackers sniff or hijack VPN connections
The new vulnerability affects most GNU/Linux distributions, as well as FreeBSD, OpenBSD, Android, iOS and macOS systems.
GCC: Optimizing Linux, the Internet, and Everything
Software is useless if computers can't run it. Even the most talented developer is at the mercy of the compiler when it comes to...
Intel Chip Flaw: Math Unit May Spill Crypto Secrets to Apps – Modern Linux,...
A security flaw within Intel Core and Xeon processors can be potentially exploited to swipe sensitive data from the chips' math processing units. Malware...
Serious Flaw in WPA2 Protocol Lets Attackers Intercept Passwords and Much More
Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords,...
In Device We Trust: Measure Twice, Compute Once with Xen, Linux, TPM 2.0...
Is it a small tablet or large phone? Is it a phone or broadcast sensor? Is it a server or virtual desktop cluster? Is...
Innovating With Open Source: Microsoft’s Story
This article was sponsored by Microsoft and written by Linux.com.
After much anticipation, LinuxCon, ContainerCon and Cloud Open China is finally here. Some of the...
Serious Privilege Escalation Bug in Unix OSes Imperils Servers Everywhere
“Stack Clash” poses threat to Linux, FreeBSD, OpenBSD, and other OSes.
A raft of Unix-based operating systems—including Linux, OpenBSD, and FreeBSD—contain flaws that let attackers...
Trivial Transfers with TFTP, Part 3: Usage
In previous articles, we introduced TFTP and discussed why you might want to use it, and we looked at various configuration options. Now let’s...
Trivial Transfers with TFTP, Part 2: Configuration
In the first article of this series, we looked at some of the, admittedly limited, features of TFTP along with some reasons why you...