<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="http://dev1galaxy.org/extern.php?action=feed&amp;tid=5000&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Log4j vulnerabilty - Yet again]]></title>
		<link>http://dev1galaxy.org/viewtopic.php?id=5000</link>
		<description><![CDATA[The most recent posts in Log4j vulnerabilty - Yet again.]]></description>
		<lastBuildDate>Mon, 25 Apr 2022 13:59:36 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Log4j vulnerabilty - Yet again]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=35747#p35747</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>... fixed the bug with patches that introduced more bugs?</p></div></blockquote></div><p>Yes ...<br />Which would mean that maybe they really didn&#039;t fix anything.</p><p>ie: just made it worse.</p><p>Fortunately I was able to purge that from my box.</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Mon, 25 Apr 2022 13:59:36 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=35747#p35747</guid>
		</item>
		<item>
			<title><![CDATA[Re: Log4j vulnerabilty - Yet again]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=35746#p35746</link>
			<description><![CDATA[<p>So they fixed the bug with patches that introduced more bugs? Isn&#039;t software great! I&#039;m beginning to think Sturgeon was an optimist...</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Mon, 25 Apr 2022 13:33:12 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=35746#p35746</guid>
		</item>
		<item>
			<title><![CDATA[Log4j vulnerabilty - Yet again]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=35707#p35707</link>
			<description><![CDATA[<p>Hello:</p><p>For those who have not purged <span class="bbc">log4j</span> from their systems:</p><p>Originally mentioned here (late December 2021) at Dev1 by hevidevi here ...</p><p><a href="https://dev1galaxy.org/viewtopic.php?id=4715" rel="nofollow">https://dev1galaxy.org/viewtopic.php?id=4715</a></p><p>... and then press here:</p><p><a href="https://www.theregister.com/2022/03/16/linux_botnet_log4j/" rel="nofollow">https://www.theregister.com/2022/03/16/ … net_log4j/</a></p><p>We now have <strong>this</strong>:</p><p><a href="https://www.theregister.com/2022/04/20/aws_log4j_patches/" rel="nofollow">https://www.theregister.com/2022/04/20/ … j_patches/</a></p><div class="quotebox"><cite>Jessica Lyons Hardcastle @ The Register wrote:</cite><blockquote><div><p>Amazon Web Services has updated its Log4j security patches after it was discovered the original fixes made customer deployments vulnerable to container escape and privilege escalation.</p><p>The vulnerabilities introduced by Amazon&#039;s Log4j hotpatch – CVE-2021-3100, CVE-2021-3101, CVE-2022-0070, CVE-2022-0071 – are all high-severity bugs rated 8.8 out of 10 on the CVSS.</p></div></blockquote></div><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Thu, 21 Apr 2022 10:57:08 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=35707#p35707</guid>
		</item>
	</channel>
</rss>
