Issues on Linux and Security
button Home

Welcome to LinuxSecure

I found some scripts on my workstation that have not been published and may be interesting for some people. Actually, I will not prepare them for publishing, but you can contact me, if you are interested in one or more of them.

  • A tool for the backup of network components. The script runs as a daemon and can be configured via config files. It reads in the config files containing the passwords of the components once, so you can store them in a crypt storage. There exist severeal templates for ssh, scp, telnet. The intention is to make automated backups from router, switches, firewalls etc.
  • Postfixanalyser was written for the trendmicro mail virusscanner. You can search for mails and you will get a status for the found mails: when did the system receive it, when was it working with the mail the last time, whats the status of the mail, where there any problem while delivering the mail. The second feature was a simple statistic: bytes and number of mails received and send, mails by status (received from extern, queued, sent to trend, received from trend, queued, delivered) and mails by problem (deferred and not sent to scanner (scanner rejected), deferred and not sent to scanner (scanner down), sent to trend, but deferred before, dereffed and not sent to extern (mta rejected), deferred and not sent to extern (mta down), sent to extern, but deferred befor).
  • A logscanner and a scanner for the checkpoint objects file.
  • A tool, that parses the registry of the genugate firewall and produces a more human readable output in html.
  • A ftp-script for the honeynet.
  • Various backupscripts in Perl and Bash.
  • Various iptables scrips.
  • A script called minilinux to create a small linux out of a huge running system.
  • Pigsparty was a small projetct that was never finished. The idea was to convert snort rule sets into iptables rule sets.
  • A snort admin interface in php.
  • A perlmodule and some programs (e.g. mfl) for the preparation and analysis of longitudinal data with a focus of same domains.

back to top

button Whats New
[2005-02-18] mp3riot version 1.3 released
[2004-10-08] mp3riot version 1.2 is out.
[2004-04-30] Added section Bridging
[2004-01-09] working progress on mp3riot version 1.2
MusicBrainz, the not-for-profit project that maintains an assortment of "open content"music metadata databases, has announceda new effort named AcousticBrainz. AcousticBrainz is designed to be an open, crowd-sourced database cataloging various "audio features"of music, including "low-level spectral information such as tempo, and additional high level descriptors for genres, moods, keys, scales and much more."The data collected is more comprehensive than MusicBrainz's existing AcoustIDdatabase, which deals only with acoustic fingerprinting for song recognition. The new project is a partnership with the Music Technology Group at Universitat Pompeu Fabra, and uses that group's free-software toolkit Essentiato perform its acoustic analyses. A follow-up postdigs into the AcousticBrainz analysis of the project's initial 650,000-track data set, including examinations of genre, mood, key, and other factors.
Introducing AcousticBrainz

Greg Kroah-Hartman has released three new stable kernels: 3.10.61, 3.14.25, and 3.17.4, each containing important updates and fixes.
A Friday kernel collection

The second version of the kdbus patches have been postedto the Linux kernel mailing list by Greg Kroah-Hartman. The biggest change since the original patch set (which we looked atin early November) is that kdbus now provides a filesystem-based interface (kdbusfs) rather than the /dev/kdbusdevice-based interface. There are lots of other changes in response to v1 review comments as well. "kdbus is a kernel-level IPC implementation that aims for resemblance to [the] protocol layer with the existing userspace D-Bus daemon while enabling some features that couldn't be implemented before in userspace."
Version 2 of the kdbus patches posted

CentOShas updated libxml2(C5: denial of service). Debianhas updated drupal7(multiple vulnerabilities). Fedorahas updated kernel(F20: multiple vulnerabilities). Gentoohas updated adobe-flash(multiple vulnerabilities). Mageiahas updated boinc-client(denial of service), ffmpeg(M3; M4: multiple vulnerabilities), hawtjni(M3: code execution), kdebase4-runtime, kwebkitpart(code execution), kdebase4-workspace(M4: privilege escalation), kdenetwork4(M3: multiple vulnerabilities), kernel(M3; M4: multiple vulnerabilities), kernel-vserver(M3: multiple vulnerabilities), krb5(ticket forgery), libvirt(information disclosure), php-smarty(M3; M4: code execution), privoxy(denial of service), python-djblets(M4: multiple vulnerabilities), python-imaging, python-pillow(multiple vulnerabilities), qemu(M4: multiple vulnerabilities), ruby(multiple vulnerabilities), srtp(M3: denial of service), and wireshark(multiple vulnerabilities). Mandrivahas updated asterisk(BS1: multiple vulnerabilities). openSUSEhas updated gnutls(multiple vulnerabilities) and libvirt(password leak). Oraclehas updated bash(O5; O6; O7: multiple vulnerabilities), libvirt(O6: multiple vulnerabilities), libXfont(O6; O7: multiple vulnerabilities), libxml2(O5: denial of service), mariadb(O7: multiple vulnerabilities), and mysql55-mysql(O5: multiple vulnerabilities). Red Hathas updated java-1.5.0-ibm(RHEL5,6: multiple vulnerabilities), java-1.7.0-ibm(RHEL6: multiple vulnerabilities), java-1.7.1-ibm(RHEL6,7: multiple vulnerabilities), and libxml2(RHEL5: denial of service). Scientific Linuxhas updated libxml2(SL5: denial of service). Ubuntuhas updated apparmor(14.04: privilege escalation) and ruby1.8, ruby1.9.1, ruby2.0, ruby2.1(12.04, 14.04, 14.10: denial of service).
Friday's security updates

On his blog, Paul McKenney investigates a bugin read-copy update (RCU) in preparation for the 3.19 merge window. "Of course, we all have specific patches that we are suspicious of. So my next step was to revert suspect patches and to otherwise attempt to outguess the bug. Unfortunately, I quickly learned that the bug is difficult to reproduce, requiring something like 100 hours of focused rcutorture testing. Bisection based on 100-hour tests would have consumed the remainder of 2014 and a significant fraction of 2015, so something better was required. In fact, something waybetter was required because there was only a very small number of failures, which meant that the expected test time to reproduce the bug might well have been 200 hours or even 300 hours instead of my best guess of 100 hours."
McKenney: Stupid RCU Tricks: rcutorture Catches an RCU Bug

Mandrivahas updated clamav(BS1.0: denial of service from 2013) and php-ZendFramework(BS1.0: authentication bypass). openSUSEhas updated emacs(13.1: multiple vulnerabilities). Red Hathas updated java-1.6.0-ibm(RHEL5&6: multiple vulnerabilities) and java-1.7.0-ibm(RHEL5: multiple vulnerabilities). SUSEhas updated firefox(SLE11SP3: multiple vulnerabilities). Ubuntuhas updated oxide-qt(14.10, 14.04: multiple vulnerabilities).
Security advisories for Thursday

The Weekly Edition for November 20, 2014 is available.
[$] Weekly Edition for November 20, 2014

Mozilla has announcedthat it is not renewing the longstanding arrangement with Google that made Google the default search engine in Firefox in exchange for a sizable payment. Instead, when the current deal ends, Firefox will adopt different default search engines in different regions, a move described as a "more local and flexible approach to increase choice and innovation on the Web."Yahoo will be the default search engine in the United States, Yandex in Russia, and Baidu in China. Mozilla CEO Chris Beard frames this change in terms of Mozilla's independence and non-commercial status. "This is why our independence matters. Being non-profit lets us make different choices. Choices that keep the Web open, everywhere and independent."The Yahoo deal, at least, lasts for five years, and one of the conditions was that Yahoo will support Mozilla's Do Not Trackheader. Google will remain a pre-installed search engine option, and will continue to provide Firefox's Safe Browsing and Geolocation features.
Mozilla drops Google in favor of a multiple-search-partner plan

Mozilla has rolled out a preview of the next major milestone in Firefox OS, its HTML-driven mobile operating system. The upcoming release is branded Firefox OS 2.0and incorporates a number of significant changes. The preview was releasedfirst as an over-the-air update available for the Flamedeveloper phone; since I had recently acquired such a device, I decided to take a look.
[$] A Firefox OS 2.0 preview on the Flame

Videos from the Tracing Summit, that was held in Düsseldorf, Germany last month, are available on YouTube. They are also linked from the schedule.
Tracing Summit 2014 videos available

CentOShas updated libvirt(C6: multiple vulnerabilities) and libXfont(C7: multiple vulnerabilities). Debianhas updated php5(out-of-bounds read flaw) and php5(regression in previous update). Fedorahas updated drupal7-ckeditor(F20; F19: cross-site scripting), geary(F20: TLS certificate issues), icecream(F20; F19: code execution), and nrpe(F20: code execution). Mandrivahas updated curl(information leak), dbus(multiple vulnerabilities), and gnutls(code execution). openSUSEhas updated dbus-1(13.2, 13.1; 12.3: denial of service) and polarssl(13.2: two vulnerabilities). Red Hathas updated kernel(RHEL6.4: denial of service), libvirt(RHEL6: multiple vulnerabilities), and libXfont(RHEL6,7: multiple vulnerabilities). Scientific Linuxhas updated libvirt(SL6: multiple vulnerabilities) and libXfont(SL6,7: multiple vulnerabilities).
Security advisories for Wednesday

Ian Jackson has announced his immediate resignation from the Debian technical committee. "While it is important that the views of the 30-40% of the project who agree with me should continue to be represented on the TC, I myself am clearly too controversial a figure at this point to do so. I should step aside to try to reduce the extent to which conversations about the project's governance are personalised. And, speaking personally, I am exhausted."(Thanks to Mattias Mattsson).
Today's Debian technical committee resignation: Ian Jackson

The preliminary results have been announced for the Debian general resolution on init system coupling. The winning option was #4, the one saying that no general resolution is required in this situation. So there will be no change in Debian policy resulting from this vote.
Results for the Debian init system coupling GR

The Electronic Frontier Foundation (EFF) is helping to launch a new non-profit organization that will offer free server certificates beginning in summer 2015. "Let's Encrypt is a new free certificate authority, which will begin issuing server certificates in 2015. Server certificates are the anchor for any website that wants to offer HTTPS and encrypted traffic, proving that the server you are talking to is the server you intended to talk to. But these certificates have historically been expensive, as well as tricky to install and bothersome to update. The Let's Encrypt authority will offer server certificates at zero cost, supported by sophisticated new security protocols. The certificates will have automatic enrollment and renewal, and there will be publicly available records of all certificate issuance and revocation."Let's Encrypt will be overseen by the Internet Security Research Group (ISRG), a California public benefit corporation.
EFF: Let's Encrypt

CentOShas updated libxfont(C6: multiple vulnerabilities), mariadb(C7: multiple vulnerabilities), and mysql55-mysql(C5: multiple vulnerabilities). Fedorahas updated oath-toolkit(F20: denial of service), python-requests-kerberos(F20; F19: authentication bypass), and qpid-cpp(F19: xml exchange can be induced to make http requests). openSUSEhas updated flash-player(13.2, 13.1, 12.3: multiple vulnerabilities) and libreoffice(13.2: code execution). Red Hathas updated bash Shift_JIS(RHEL5.9: multiple vulnerabilities). Scientific Linuxhas updated mariadb(SL7: multiple vulnerabilities). SUSEhas updated flash-player(SLED11 SP3: multiple vulnerabilities). Ubuntuhas updated mountall(14.10: privilege escalation).
Tuesday's security updates

QEMU 'vmstate_xhci_event' Field Memory Corruption Vulnerability
Vuln: QEMU 'vmstate_xhci_event' Field Memory Corruption Vulnerability

QEMU CVE-2014-3689 Multiple Local Security Bypass Vulnerabilities
Vuln: QEMU CVE-2014-3689 Multiple Local Security Bypass Vulnerabilities

QEMU L2 Table Size Validation Integer Overflow Vulnerability
Vuln: QEMU L2 Table Size Validation Integer Overflow Vulnerability

QEMU 'hw/usb/bus.c' Heap Based Buffer Overflow Vulnerability
Vuln: QEMU 'hw/usb/bus.c' Heap Based Buffer Overflow Vulnerability

[security bulletin] HPSBUX03087 SSRT101413 rev.2 - HP-UX CIFS Server (Samba), Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Access
Bugtraq: [security bulletin] HPSBUX03087 SSRT101413 rev.2 - HP-UX CIFS Server (Samba), Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Access

[ MDVSA-2014:224 ] krb5
Bugtraq: [ MDVSA-2014:224 ] krb5

[ MDVSA-2014:223 ] wireshark
Bugtraq: [ MDVSA-2014:223 ] wireshark

[ MDVSA-2014:222 ] libvirt
Bugtraq: [ MDVSA-2014:222 ] libvirt

News, Infocus, Columns, Vulnerabilities, Bugtraq ...
More rss feeds from SecurityFocus