OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

NL1VKL > PR       21.07.21 11:30l 45 Lines 1527 Bytes #999 (0) @ WW
BID : 32836NL1VKL
Read: GAST DQB562
Subj: Re: Direwolf FX.25
Path: DBO595<DBX320<BLM274<CB0ESN<FU0BOX<KS1BBS<HEJ717<VB1BOX<NL3VKL
Sent: 210721/0929Z @:NL3VKL.NBO.NLD.EU #:1727 [Uden] $:32836NL1VKL
From: NL1VKL@NL3VKL.NBO.NLD.EU
To  : PR@WW

Message from: NL1VKL@NL3VKL

Quoting from a previous message...

> 
> From: MD2SAW@MD2BBS.#SAW.SAA.DEU.EU
> To  : PR@WW
> 
> 
> Do u can more about the security issue ?
> --
> 73 Manuel.
> 

I can't share detailed info (yet)... It's quite a breach actually and I 
first want to do 2 things before sharing any details as my recent findings 
might only be a 'tip of the iceberg'.

1) Move/downgrade my own setup to 4.19 kernel. 2) Report to the Linux kernel 
and linux-hams maintainers.

After some investigation I don't believe the issue is only NETROM related, 
but I noticed it only there (yet). Because of the Linux kernel's complexity 
it's very hard to trace the actual cause / place where things go (or done) 
wrong.

733! Dave de NL1VKL

====================================================================
 _____ __    ___   _____ _____ __    				  
|   | |  |  |_  | |  |  |  |  |  |       Sysop: Dave
| | | |  |__ _| |_|  |  |    -|  |__     QTH:   Uden - JO21TP
|_|___|_____|_____|\___/|__|__|_____|    BBS:   NL3VKL.NBO.NLD.EU
                                         QRV:   27.235 MHz (FM 1k2)
                                                27.365 MHz (LSB 1k2)                                           
NL3VKL BBS
NL5VKL Net/Rom node / internet gateway  https://nl5vkl.mijndingen.nl
====================================================================
** This message is generated with Sally 7.2.044
-----------------------------------------------------------------



Lese vorherige Mail | Lese naechste Mail


 24.11.2024 07:41:22lZurueck Nach oben