Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

According to this update: http://www.openwall.com/lists/oss-security/2015/01/27/18

The Qualys guys were unable to find any issues with sshd and tcp_wrappers. I imagine I'm not the only one that has /etc/hosts.deny setup to reject all but some IPs, but according to Qualys tests this issue cannot be triggered via someone with exploitable RDNS. As far as they know -- of course you should upgrade when you can.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: