Welcome to LinuxSecure
I found some scripts on my workstation that have not been
published and may be interesting for some people. Actually, I will not prepare them for publishing, but you can
contact me, if you are interested in one or more of them.
- A tool for the backup of network components. The script runs as a daemon and can be configured via config files.
It reads in the config files containing the passwords of the components once, so you can store them in a crypt storage.
There exist severeal templates for ssh, scp, telnet. The intention is to make automated backups from router, switches, firewalls etc.
- Postfixanalyser was written for the trendmicro mail virusscanner. You can search for mails and you will get a
status for the found mails: when did the system receive it, when was it working with the mail the last time, whats the status of the
mail, where there any problem while delivering the mail. The second feature was a simple statistic: bytes and number of mails received and send,
mails by status (received from extern, queued, sent to trend, received from trend, queued, delivered) and mails by problem
(deferred and not sent to scanner (scanner rejected), deferred and not sent to scanner (scanner down), sent to trend, but deferred before,
dereffed and not sent to extern (mta rejected), deferred and not sent to extern (mta down), sent to extern, but deferred befor).
- A logscanner and a scanner for the checkpoint objects file.
- A tool, that parses the registry of the genugate firewall and produces a more human readable output in html.
- A ftp-script for the honeynet.
- Various backupscripts in Perl and Bash.
- Various iptables scrips.
- A script called minilinux to create a small linux out of a huge running system.
- Pigsparty was a small projetct that was never finished. The idea was to convert snort rule sets into iptables rule sets.
- A snort admin interface in php.
- A perlmodule and some programs (e.g. mfl) for the preparation and analysis of longitudinal data with a focus of same domains.
back to top
| Whats New|
|[2005-02-18] mp3riot version 1.3 released|
|[2004-10-08] mp3riot version 1.2 is out.|
|[2004-04-30] Added section Bridging|
|[2004-01-09] working progress on mp3riot version 1.2|
|The 4.7-rc5kernel prepatch is out.
"I think things are calming down, although with almost two thirds
of the commits coming in since Friday morning, it doesn't feel that
way - my Fridays end up feeling very busy. But looking at the numbers,
we're pretty much where we normally are at this time of the rc
|Kernel prepatch 4.7-rc5|
|The just-released 4.6.3, 4.4.14, and 3.14.73 stable kernels contain a set
of netfilter fixes that, it has just been disclosed, fix a couple of severe
local privilege-escalation vulnerabilities. Anybody who is running a site
with user and network namespaces enabled will want to update their kernels
in short order. The fixes were originally committed into 4.6-rc2 in April
with no comment regarding their implications.
|A couple of unpleasant local kernel vulnerabilities|
|Greg Kroah-Hartman has released stable kernel updates 4.6.3, 4.4.14, and 3.14.73. Each contains important fixes
throughout the tree.
|Three new stable kernels|
|CentOShas updated kernel(C7: multiple vulnerabilities), libxml2(C6; C7: multiple vulnerabilities), ocaml(C7: information leak), setroubleshoot(C7: multiple vulnerabilities), and setroubleshoot-plugins(C7: multiple vulnerabilities).
Fedorahas updated python(F24: startTLS stripping), setroubleshoot(F24: code execution), and setroubleshoot-plugins(F24: code execution).
Oraclehas updated kernel(O7: multiple vulnerabilities), libxml2(O6; O7: multiple vulnerabilities), ocaml(O7: information leak), and setroubleshoot and setroubleshoot-plugins(O7: multiple vulnerabilities).
Red Hathas updated kernel(RHEL7: multiple vulnerabilities), kernel-rt(RHEL7: multiple vulnerabilities), and ocaml(RHEL7: information leak).
Scientific Linuxhas updated libxml2(SL 6,7: multiple vulnerabilities) and setroubleshoot and
setroubleshoot-plugins(SL7; SL6: multiple vulnerabilities).
SUSEhas updated kernel(SLE11: multiple vulnerabilities).
|Friday's security updates|
|It seems that the Comodo TLS certificate authority (CA) has filed for three trademarks using variations of "Let's Encrypt". As might be guessed, the Let's Encrypt project is less than pleasedby Comodo trying to coopt its name. "Since March of 2016 we have repeatedly asked Comodo to abandon their ?Let?s Encrypt? applications, directly and through our attorneys, but they have refused to do so. We are clearly the first and senior user of ?Let?s Encrypt? in relation to Internet security, including SSL/TLS certificates ? both in terms of length of use and in terms of the widespreadpublic association of that brand with our organization.
If necessary, we will vigorously defend the Let?s Encrypt brand we?ve worked so hard to build. That said, our organization has limited resources and a protracted dispute with Comodo regarding its improper registration of our trademarks would significantly and unnecessarily distract both organizations from the core mission they should share: creating a more secure and privacy-respecting Web. We urge Comodo to do the right thing and abandon its ?Let?s Encrypt? trademark applications so we can focus all of our energy on improving the Web."[Thanks to Paul Wise.]
|Defending Our Brand (Let's Encrypt)|
|Version 4.7 of the Xen hypervisor has been released. "With dozens of
major improvements, many more bug fixes and small improvements, and
significant improvements to Drivers and Devices, Xen Project 4.7 reflects a
thriving community around the Xen Project Hypervisor."Some of the
new features include live patching, better dom0 robustness, better
migration support between non-identical hosts, scheduler improvements, and
more. See the
release notesfor more information.
|Xen 4.7 released|
|Debian-LTShas updated squidguard(cross-site scripting).
Fedorahas updated php-symfony-security-acl(F24: unspecified). Also, Fedora
has sent out a reminderthat Fedora 22
will reach its end of life on July 19.
Mageiahas updated chromium-browser-stable(multiple vulnerabilities), kernel-linus(multiple vulnerabilities, one from 2013), kernel-tmb(multiple vulnerabilities, one from 2013), libimobiledevice(socket listening on all
network interfaces), and python(three vulnerabilities).
openSUSEhas updated libarchive(42.1: code execution), mariadb(13.2: many
unspecified vulnerabilities), and obs-service-source_validator(42.1; 13.2:
Red Hathas updated libxml2(RHEL6&7: multiple vulnerabilities) and setroubleshoot and
setroubleshoot-plugins(RHEL7: three vulnerabilities).
|Thursday's security advisories|
|The LWN.net Weekly Edition for June 23, 2016 is available.
|[$] LWN.net Weekly Edition for June 23, 2016|
|Back in 2009, Sony removed the "install other
OS"optionfrom its PS3 game consoles, removing the ability to install
Linux on those machines. It then went after developers who figured out how
to jailbreak the device. Ars technica reportsthat Sony has now settled a class-action lawsuit over those actions.
"Under the terms of the accord, which has not been approved by
a California federal judge yet, gamers are eligible to receive $55 if they
used Linux on the console. The proposed settlement, which will be vetted by
a judge next month, also provides $9 to each console owner that bought a
PS3 based on Sony's claims about 'Other OS' functionality."The
lawyers, instead, get over $2 million.
|Sony agrees to pay millions to gamers to settle PS3 Linux debacle (ars technica)|
|CentOShas updated setroubleshoot(C6: multiple vulnerabilities) and setroubleshoot-plugins(C6: multiple vulnerabilities).
Debian-LTShas updated icedove(multiple vulnerabilities) and python2.7(three vulnerabilities).
Fedorahas updated expat(F24:
multiple vulnerabilities), php-zendframework-zendxml(F23; F22:
insecure ciphertexts), php-ZendFramework2(F23; F22:
insecure ciphertexts), and xen(F22: two vulnerabilities).
openSUSEhas updated Chromium(13.1: multiple vulnerabilities), ImageMagick(Leap42.1: command execution), and vlc(Leap42.1; 13.2: multiple vulnerabilities).
Oraclehas updated openssl(OL5:
multiple vulnerabilities) and setroubleshoot
and setroubleshoot-plugins(OL6: multiple vulnerabilities).
Red Hathas updated python-django-horizon(RHOSP8.0; RHELOSP7 for RHEL7; RHELOSP6 for RHEL7; RHELOSP5 for RHEL7; RHELOSP5 for RHEL6: cross-site
scripting) and setroubleshoot and
setroubleshoot-plugins(RHEL6: multiple vulnerabilities).
|Security advisories for Wednesday|
|Version 1.3 of the Elixirprogramming language has been released. "Elixir v1.3 brings many improvements to the language, the compiler and its tooling, specially Mix (Elixir?s build tool) and ExUnit (Elixir?s test framework). The most notable additions are the new Calendar types, the new cross-reference checker in Mix, and the assertion diffing in ExUnit."|
|Elixir v1.3 released|
|Not to be left behind by a certain competing project, the developers of the
Flatpak packaging system have put out a press
releaseproclaiming its virtues. "The Linux desktop has long
been held back by platform fragmentation. This has been a burden on
developers, and creates a high barrier to entry for third party application
developers. Flatpak aims to change all that. From the very start its
primary goal has been to allow the same application to run across a myriad
of Linux distributions and operating systems. In doing so, it greatly
increases the number of users that application developers can easily
|Fedorahas updated nfdump(F23; F22:
multiple vulnerabilities) and webkitgtk4(F22: two vulnerabilities).
openSUSEhas updated ctdb(Leap42.1, 13.2: privilege escalation), libtorrent-rasterbar(Leap42.1, 13.2: denial
of service), ntp(Leap42.1: multiple
vulnerabilities), and kernel(Leap42.1: multiple vulnerabilities).
Red Hathas updated chromium-browser(RHEL6: multiple vulnerabilities).
Slackwarehas updated libarchive(multiple vulnerabilities) and pcre(denial of service).
SUSEhas updated ctdb(SLE11-SP4:
privilege escalation), libimobiledevice,
usbmuxd(SLE12-SP1: sockets listening on INADDR_ANY), and php53(SLES11-SP2: multiple vulnerabilities).
Ubuntuhas updated dnsmasq(16.04, 15.10: denial of service), expat(two vulnerabilities), haproxy(16.04:
denial of service), spice(16.04, 15.10,
14.04: two vulnerabilities), wget(code
execution), and xmlrpc-c(12.04: multiple vulnerabilities).
|Security updates for Tuesday|
|After several schedule slips, the Fedora 24 release is available.
"The Fedora Project has embarked on a great journey... redefining what
an operating system should be for users and developers. Such innovation
does not come overnight, and Fedora 24 is one big step on the road to
the next generation of Linux distributions. But that does not mean that
Fedora 24 is some 'interim' release; there are great new features for
Fedora users to deploy in their production environments right now!"See the
Fedora 24 approved features listfor an idea of what's in this
|Fedora 24 released|
|On the Project Zero blog, Jann Horn describesa bug Horn found that allows user space to overflow the kernel stack using the ecryptfs encrypted filesystem. That overflow can be used to elevate privileges for local users on Ubuntu systems configured for encrypted home directories. "However, the reason why I wrote a full root exploit for this not exactly widely exploitable bug is that I wanted to demonstrate that Linux stack overflows can occur in very non-obvious ways, and even with the existing mitigations turned on, they're still exploitable. In my bug report, I asked the kernel security list to add guard pages to kernel stacks and remove the thread_info struct from the bottom of the stack to more reliably mitigate this bug class, similar to what other operating systems and grsecurity are already doing. Andy Lutomirski had actually already started working on this, and he has now published patches that add guard pages: https://lkml.org/lkml/2016/6/15/1064."|
|Horn: Exploiting Recursion in the Linux Kernel|