Qualys Security Advisory
Local information disclosure in OpenSMTPD (CVE-2020-8793)
==
Contents
==
Summary
Analysis
Exploitation
POKE 47196
Qualys Security Advisory
LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)
==
Contents
==
Summary
Analysis
...
Acknowledgments
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] proftpd (SSA:2020-051-01)
New proftpd packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
Hi,
we have published a new post in our blog titled "How to hack a company by
circumventing its WAF through the abuse of a different security appliance and
win bug bounties".
We basically have [ab]used a Bluecoat device behaving as a request forwarder to
mask our malicious payload,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] libarchive (SSA:2020-043-01)
New libarchive packages are available for Slackware 14.1, 14.2, and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
Hi,
we have just released EnumJavaLibs to perform java classes enumeration against
java services.
To discover a deserialization vulnerability is often easy. When source code is
available, it comes down to finding calls to readObject() and finding a way for
user input to reach that function. In
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-firefox (SSA:2020-042-01)
New mozilla-firefox packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-thunderbird (SSA:2020-042-02)
New mozilla-thunderbird packages are available for Slackware 14.2 and -current
to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] sudo (SSA:2020-031-01)
New sudo packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
for Windows 7.17 may be obtained from:
https://support.apple.com/HT204283
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2020-3865: Ryan Pickren (ryanpickren.com)
Installation note:
iCloud for Windows 10.9.2 may be obtained from:
https://support.apple.com/HT204283
Information will also be posted to the Apple Security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-20:02.ipsec Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-20:01.libfetch Security Advisory
The FreeBSD Project
Topic
ut".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/securi
are Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 13.3.1 and iPadOS 13.3.1".
Information will also be posted to the Apple Security Upd
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update
2020-001 Mojave, Security Update 2020-001 High Sierra
macOS Catalina 10.15.3, Security Update 2020-001 Mojave, and
Security Update 2020-001 High Sierra are now available and
address
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-20:03.thrmiscSecurity Advisory
The FreeBSD Project
Topic
to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-BEGIN PGP SIGNATURE
for software updates by selecting
"Settings -> System -> Software Update -> Update Software."
To check the current version of software, select
"Settings -> General -> About."
Information will also be posted to the Apple Security Updates
web site: https://support.
to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-BEGIN PGP SIGNATURE-
iQIyBAEBCAAdFiEEM5FaaFRjww9EJgvRBz4uGe3y0M0FAl4whoIACgkQBz4uGe3y
Qualys Security Advisory
LPE and RCE in OpenSMTPD (CVE-2020-7247)
==
Contents
==
Summary
Analysis
Exploitation
Acknowledgments
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-thunderbird (SSA:2020-024-01)
New mozilla-thunderbird packages are available for Slackware 14.2 and -current
to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-thunderbird (SSA:2020-010-01)
New mozilla-thunderbird packages are available for Slackware 14.2 and -current
to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-firefox (SSA:2020-009-01)
New mozilla-firefox packages are available for Slackware 14.2 and -current to
fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
New kernel packages are available for Slackware 14.2 to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages/linux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-firefox (SSA:2020-006-01)
New mozilla-firefox packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] tigervnc (SSA:2019-354-02)
New tigervnc packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] openssl (SSA:2019-354-01)
New openssl packages are available for Slackware 14.2 and -current to
fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] wavpack (SSA:2019-353-01)
New wavpack packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
Qualys Security Advisory
Local Privilege Escalation in OpenBSD's dynamic loader (CVE-2019-19726)
==
Contents
==
Summary
Analysis
has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 12.4.4".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/securi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update
2019-002 Mojave, Security Update 2019-007 High Sierra
macOS Catalina 10.15.2, Security Update 2019-002 Mojave,
Security Update 2019-007 High Sierra is now available and
addresses
: Joonun Jang
Security
Available for: Apple TV 4K and Apple TV HD
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8832: Insu Yun of SSLab at Georgia Tech
WebKit
Available
13.0.4 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp
:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "11.3".
Information will also be posted to the Apple Security Updates
web site: https://support
Description: This issue was addressed by updating to expat version
2.2.8.
CVE-2019-15903: Joonun Jang
Security
Available for: Apple Watch Series 1 and later
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed
Qualys Security Advisory
Authentication vulnerabilities in OpenBSD
==
Contents
==
1. CVE-2019-19521: Authentication bypass
1.1. Analysis
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-firefox (SSA:2019-337-01)
New mozilla-firefox packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
Asterisk Project Security Advisory - AST-2019-007
ProductAsterisk
SummaryAMI user could execute system commands.
Nature of Advisory Remote Code Execution
Asterisk Project Security Advisory -
ProductAsterisk
SummaryRe-invite with T.38 and malformed SDP causes crash.
Nature of Advisory Remote Crash
Asterisk Project Security Advisory - AST-2019-006
ProductAsterisk
SummarySIP request can change address of a SIP peer.
Nature of Advisory Denial of Service
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] bind (SSA:2019-324-01)
New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)
New kernel packages are available for Slackware 14.2 to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages/linux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:25.mcepsc Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:26.mcuSecurity Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
New kernel packages are available for Slackware 14.2 to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages/linux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] libtiff (SSA:2019-308-01)
New libtiff packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages
in the menu bar
* Select About Xcode
* The version after applying this update will be "11.2".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-firefox (SSA:2019-295-01)
New mozilla-firefox packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] python (SSA:2019-293-01)
New python packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] sudo (SSA:2019-287-01)
New sudo packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222 and the Swift
announcements section on the forum:
https://forums.swift.org/c/general-announce
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message
/download/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-BEGIN PGP SIGNATURE
://support.apple.com/HT204283
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-BEGIN PGP SIGNATURE
of TrendMicro Mobile Security
Research Team
apache_mod_php
Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012
and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and
later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro
(Late 2013 and later)
Impact
Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-BEGIN PGP SIGNATURE-
iQJdBAEBCABHFiEEM5FaaFRjww9EJgvRBz4uGe3y0M0FAl2biHQpHHByb2R1Y3Qt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] tcpdump (SSA:2019-274-01)
New libpcap and tcpdump packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 13.1.1 and iPadOS 13.1.1".
Information will also be posted to the Apple Security Updates
web s
.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 12.4.2".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2019-9-26-2 macOS Mojave 10.14.6 Supplemental Update 2,
Security Update 2019-005 High Sierra, Security Update 2019-005
Sierra
macOS Mojave 10.14.6 Supplemental Update 2, Security Update 2019-005
High Sierra, Security Update 2019-005 Sierra
Description: A logic issue was addressed with improved state
management.
CVE-2019-8674
Installation note:
Safari 13 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed
on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/
for: iPhone 6s and later
Impact: A 3D model constructed to look like the enrolled user may
authenticate via Face ID
Description: This issue was addressed by improving Face ID machine
learning models.
CVE-2019-8760: Wish Wu (吴潍浠 @wish_wu) of Ant-financial Light-Year
Security Lab
Foundation
About."
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdF
be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "11.0".
Information will also be posted to the Apple Security Updates
web s
has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 13.1 and iPadOS 13.1".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed wi
.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-BEGIN PGP SIGNATURE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-thunderbird (SSA:2019-268-01)
New mozilla-thunderbird packages are available for Slackware 14.2 and -current
to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] expat (SSA:2019-259-01)
New expat packages are available for Slackware 14.0, 14.1, 14.2, and -current
to fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-thunderbird (SSA:2019-254-02)
New mozilla-thunderbird packages are available for Slackware 14.2 and -current
to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] openssl (SSA:2019-254-03)
New openssl packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] curl (SSA:2019-254-01)
New curl packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches
Asterisk Project Security Advisory - AST-2019-005
Product Asterisk
Summary Remote Crash Vulnerability in audio transcoding
Nature of Advisory Denial of Service
Asterisk Project Security Advisory - AST-2019-004
ProductAsterisk
SummaryCrash when negotiating for T.38 with a declined
stream
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] seamonkey (SSA:2019-247-01)
New seamonkey packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2019-238-01)
New kernel packages are available for Slackware 14.2 to fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages/linux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:23.midi Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:24.mqueuefs Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:23.midi Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:22.mbuf Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mozilla-firefox (SSA:2019-226-02)
New mozilla-firefox packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
) and Zhe Jin (金哲) from Chengdu
Security Response Center of Qihoo 360 Technology Co. Ltd.
CVE-2019-8669: akayn working with Trend Micro's Zero Day Initiative
CVE-2019-8671: Apple
CVE-2019-8672: Samuel Groß of Google Project Zero
CVE-2019-8673: Soyeon Park and Wen Xu of SSLab at Georgia Tech
CVE-2019
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2019-226-01)
New kernel packages are available for Slackware 14.2 to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages/linux
lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2019-8644: G. Geshev working with Trend Micro's Zero Day
Initiative
CVE-2019-8666: Zongming Wang (王宗明) and Zhe Jin (金哲) from Chengdu
Security Response Center of Qihoo 360
patterns
Description: This issue was addressed with improved input validation.
CVE-2019-9518: Piotr Sikora of Google, Envoy Security Team
Installation note:
SwiftNIO HTTP/2 1.5.0 may be obtained via Swift Package Manager.
Information will also be posted to the Apple Security Updates
web site
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
Information will also be posted to the Apple Security Updates
web si
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2019-8-13-1 Additional information for
APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update
2019-004 High Sierra, Security Update 2019-004 Sierra
macOS Mojave 10.14.6, Security Update 2019-004 High Sierra,
Security Update 2019-004
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] kdelibs (SSA:2019-220-01)
New kdelibs packages are available for Slackware 14.2 and -current to
fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--+
patches/packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:21.bhyve Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:20.bsnmp Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:19.mldv2 Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:18.bzip2 Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] mariadb (SSA:2019-213-01)
New mariadb packages are available for Slackware 14.1 and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--+
patches/packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:16.bhyve Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:17.fd Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:15.mqueuefs Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:14.freebsd32 Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:12.telnet Security Advisory
The FreeBSD Project
Topic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:13.ptsSecurity Advisory
The FreeBSD Project
Topic
1 - 100 of 8280 matches
Mail list logo