Issues on Linux and Security
button Home

Welcome to LinuxSecure

I found some scripts on my workstation that have not been published and may be interesting for some people. Actually, I will not prepare them for publishing, but you can contact me, if you are interested in one or more of them.

  • A tool for the backup of network components. The script runs as a daemon and can be configured via config files. It reads in the config files containing the passwords of the components once, so you can store them in a crypt storage. There exist severeal templates for ssh, scp, telnet. The intention is to make automated backups from router, switches, firewalls etc.
  • Postfixanalyser was written for the trendmicro mail virusscanner. You can search for mails and you will get a status for the found mails: when did the system receive it, when was it working with the mail the last time, whats the status of the mail, where there any problem while delivering the mail. The second feature was a simple statistic: bytes and number of mails received and send, mails by status (received from extern, queued, sent to trend, received from trend, queued, delivered) and mails by problem (deferred and not sent to scanner (scanner rejected), deferred and not sent to scanner (scanner down), sent to trend, but deferred before, dereffed and not sent to extern (mta rejected), deferred and not sent to extern (mta down), sent to extern, but deferred befor).
  • A logscanner and a scanner for the checkpoint objects file.
  • A tool, that parses the registry of the genugate firewall and produces a more human readable output in html.
  • A ftp-script for the honeynet.
  • Various backupscripts in Perl and Bash.
  • Various iptables scrips.
  • A script called minilinux to create a small linux out of a huge running system.
  • Pigsparty was a small projetct that was never finished. The idea was to convert snort rule sets into iptables rule sets.
  • A snort admin interface in php.
  • A perlmodule and some programs (e.g. mfl) for the preparation and analysis of longitudinal data with a focus of same domains.

back to top

button Whats New
[2005-02-18] mp3riot version 1.3 released
[2004-10-08] mp3riot version 1.2 is out.
[2004-04-30] Added section Bridging
[2004-01-09] working progress on mp3riot version 1.2
Debianhas updated openssl(multiple vulnerabilities), qemu(code execution), and qemu-kvm(code execution). Mageiahas updated apache-mod_security(rules bypass), cups-filters(M4: code execution), openjpeg(code execution), php(denial of service), and rsync(M4: denial of service). Oraclehas updated kernel(2.6.39 - OL5; OL6: privilege escalation) and kernel(3.8.13 - OL6: privilege escalation). SUSEhas updated jakarta-commons-fileupload(SLES11 SP3: denial of service).
Friday's security updates

The Debian project has announced that the security support period for the 6.0 ("squeeze") release has been extended by nearly two years; it now runs out in February 2016. At the end, squeeze will have received a full five years of security support. "squeeze-lts is only going to support i386 and amd64. If you're running a different architecture you need to upgrade to Debian 7 (wheezy). Also there are going to be a few packages which will not be supported in squeeze-lts (e.g. a few web-based applications which cannot be supported for five years). There will be a tool to detect such unsupported packages."
Debian 6.0 to get long-term support

Internet Systems Consortium, the non-profit behind the BIND DNS server, has released version 1.2 of BIND 10, which is the last release it will make of the "applications framework for Internet infrastructure, such as DNS". That completes ISC's development effort on BIND 10, so it has renamed the project to Bundyand turned it over to the community for updates and maintenance. "'BIND 10 is an excellent software system,' said Scott Mann, ISC's Vice President of Engineering, 'and a huge step forward in open-source infrastructure software. Unfortunately, we do not have the resources to continue development on both projects, and BIND 9 is much more widely used.' 'The BIND 10 software is open-source,' Scott added, 'so we are making it available for anyone who wants to continue its development. The source will be available from GitHub under the name Bundy, to mitigate the confusion between it and ISC's BIND 9 (a completely separate system). The name 'BIND' is associated with ISC; we have changed its name as a reminder that ISC is no longer involved with the project.'"
ISC releases BIND 10 1.2, renames it, and turns it over to community

Ubuntu has announced the release of its latest long-term support distribution: Ubuntu 14.04 LTS (aka "Trusty Tahr"). The release noteshave all the details. It comes in a multitude of configurations, for desktops, servers, the cloud, phones, and tablets; also in many flavors: Kubuntu, Edubuntu, Xubuntu, Lubuntu, Ubuntu GNOME, Ubuntu Kylin, and Ubuntu Studio. "Ubuntu 14.04 LTS is the first long-term support release with support for the new "arm64"architecture for 64-bit ARM systems, as well as the "ppc64el"architecture for little-endian 64-bit POWER systems. This release also includes several subtle but welcome improvements to Unity, AppArmor, and a host of other great software."
Ubuntu 14.04 LTS (Trusty Tahr) released

NPR has a lookat the cross-pollination of open source software and agriculture, resulting in the release of the first "Open Source Seeds". The new Open Source Seed Initiativewas formed to put seeds, and, more importantly, their genetic material, into a protected commons, so they will be available in perpetuity. "At an event on the campus of the University of Wisconsin, Madison, backers of the new Open Source Seed Initiative will pass out 29 new varieties of 14 different crops, including carrots, kale, broccoli and quinoa. Anyone receiving the seeds must pledge not to restrict their use by means of patents, licenses or any other kind of intellectual property. In fact, any future plant that's derived from these open source seeds also has to remain freely available as well."(Thanks to Rich Brown.)
Plant Breeders Release First 'Open Source Seeds' (NPR)

The QEMUteam has announcedthe release of version 2.0.0 of the QEMU "open source machine emulator and virtualizer". New features in the release include support for KVM on AArch64 (64-bit ARM) systems, support for all 64-bit ARMV8 instructions (other than the optional CRC and crypto extensions), support for the Allwinner A10-based cubieboard, CPU hotplug for Q35 x86 systems, better Windows guest performance when doing many floating-point or SIMD operations, live snapshot merging, new management interfaces for CPU and virtio-rng hotplug, direct access to NFSv3 shares using libnfs, and lots more. Detailed information about all of the changes can be found in the changelog.
QEMU 2.0.0 released

Debianhas announcedthat regular security updates for Debian 6.0 ("squeeze") will cease on May 31. But there will be long-term support for most of the packages in squeeze on just the i386 and amd64 architectures until February 2016. Fedorahas updated cacti(F20; F19: multiple vulnerabilities), json-c(F20: two denial of service flaws), and openstack-keystone(F20: access restriction bypass). Mandrivahas updated json-c(BS1.0: two denial of service flaws). Oraclehas updated java-1.6.0-openjdk(OL6; OL5: multiple vulnerabilities, most unspecified) and java-1.7.0-openjdk(OL6; OL5: multiple vulnerabilities, most unspecified). Red Hathas updated java-1.6.0-sun(many vulnerabilities, lots unspecified), java-1.7.0-oracle(RHEL; RHEL Supplementary: multiple vulnerabilities, most unspecified), and libyaml(RHEL6: two code execution flaws). Scientific Linuxhas updated java-1.6.0-openjdk(multiple vulnerabilities, most unspecified) and java-1.7.0-openjdk(SL5: multiple vulnerabilities, most unspecified). SUSEhas updated flash-player(SLE11SP3: multiple vulnerabilities) and kernel(SLERTE11SP3; SLE10SP4: multiple vulnerabilities).
Security updates for Thursday

The Weekly Edition for April 17, 2014 is available.
[$] Weekly Edition for April 17, 2014

CentOShas updated java-1.6.0-openjdk(C6; C5: multiple vulnerabilities) and java-1.7.0-openjdk(C6; C5: multiple vulnerabilities). Debianhas updated chromium-browser(multiple vulnerabilities) and virtualbox(code execution). Fedorahas updated cups-filters(F20: command execution), ImageMagick(F20: code execution), jbigkit(F20: code execution), libinfinity(F20; F19: unspecified vulnerability), mingw-openjpeg(F20; F19: code execution), mingw-openssl(F19: information disclosure), oath-toolkit(F20: replays one time passwords), php(F20; F19: denial of service), squid(F19: denial of service), v8(F20: multiple vulnerabilities), and wordpress(F20: multiple vulnerabilities). Mageiahas updated asterisk(MG4; MG3: multiple vulnerabilities), cups-filters(MG4: multiple vulnerabilities), elfutils(MG3&4: code execution), fail2ban(MG3&4: denial of service), jbigkit(MG3&4: code execution), json-c(MG3&4: denial of service), and tigervnc(MG3&4: code execution). Mandrivahas updated asterisk(two vulnerabilities). openSUSEhas updated curl(11.4: multiple vulnerabilities). Red Hathas updated java-1.6.0-openjdk(RHEL5&6: multiple vulnerabilities) and java-1.7.0-openjdk(RHEL6; RHEL5: multiple vulnerabilities). Scientific Linuxhas updated java-1.7.0-openjdk(SL6: multiple vulnerabilities). SUSEhas updated kernel(SLE11 SP3: multiple vulnerabilities) and strongswan(SLE11, SLE10 LTSS: authentication bypass).
Security advisories for Wednesday

Here is a long piece from Christian Schallerdescribing the planning for the upcoming Fedora Workstation product. "So when we are planning the Fedora Workstation we are not just looking at what features we can develop for individual libraries or applications like GTK+, Firefox or LibreOffice, but we are looking at what we want the system as a whole to look like. And maybe most important we try our hardest to look at things from a feature/usecase viewpoint first as opposed to a specific technology viewpoint."
Schaller: Preparing the ground for the Fedora Workstation

There is a saying that you need to spend money to make money, though this apparent paradox is easily resolved with a start-up loan and the discipline of balancing expenses against income. A similar logic applies to the management of memory in an operating system kernel such as Linux: sometimes you need to allocate memory to free memory. Here, too, discipline is needed, though the typical consequences of not being sufficiently careful is not bankruptcy but rather a deadlock. The history of how the Linux kernel developed its balance between saving and spending is interesting as a microcosm of how Linux development proceeds. Click below (subscribers only) for the full article by Neil Brown.
[$] Avoiding memory-allocation deadlocks

Debianhas updated strongswan(authentication bypass). Fedorahas updated mingw-openssl(F20: information disclosure), mod_security(F20; F19: rules bypass), php-ZendFramework(F20; F19: multiple vulnerabilities), php-ZendFramework2(F20; F19: multiple vulnerabilities), and systemd(F20: code execution). openSUSEhas updated couchdb(13.1, 12.3: denial of service) and jakarta-commons-fileupload(13.1; 12.3: denial of service). Ubuntuhas updated curl(all: information disclosure) and python-imaging(all: two tmpfile flaws).
Security updates for Tuesday

The results of the 2014 Debian project leader election are in; incumbent Lucas Nussbaum fended off challenger Neil McGovern to win a second one-year term in this position. See the DPL election pagefor details on how the voting went.
Lucas Nussbaum reelected as Debian project leader

Version 2.2of the Cinnamon desktop environment is out. New features include a lot of improvements to the settings dialogs, tweaks to the "hot corners"and heads-up display mechanisms, better high-resolution display support, and more.
Cinnamon 2.2 released

Greg Kroah-Hartman has released kernels 3.14.1, 3.13.10, 3.10.37, and 3.4.87. Each contains important updates and fixes; in addition, Greg notes that 3.13.10 will be the next-to-last release in the 3.13.y stable series, so migration to 3.14.y soon is advisable.
Four new stable kernels

Oracle MySQL Server CVE-2014-2432 Remote Security Vulnerability
Vuln: Oracle MySQL Server CVE-2014-2432 Remote Security Vulnerability

Oracle MySQL Server CVE-2014-2438 Remote Security Vulnerability
Vuln: Oracle MySQL Server CVE-2014-2438 Remote Security Vulnerability

Oracle MySQL Client CVE-2014-2440 Remote Security Vulnerability
Vuln: Oracle MySQL Client CVE-2014-2440 Remote Security Vulnerability

Oracle MySQL Server CVE-2014-2436 Remote Security Vulnerability
Vuln: Oracle MySQL Server CVE-2014-2436 Remote Security Vulnerability

[security bulletin] HPSBMU02995 rev.3 - HP Software HP Service Manager, Asset Manager, UCMDB Browser, UCMDB Configuration Manager, Executive Scorecard, Server Automation, Diagnostics, LoadRunner, and Performance Center, running OpenSSL, Remote Disclosure
Bugtraq: [security bulletin] HPSBMU02995 rev.3 - HP Software HP Service Manager, Asset Manager, UCMDB Browser, UCMDB Configuration Manager, Executive Scorecard, Server Automation, Diagnostics, LoadRunner, and Performance Center, running OpenSSL, Remote Disclosure

[security bulletin] HPSBMU02998 rev.2 - HP System Management Homepage (SMH) running OpenSSL on Linux and Windows, Remote Disclosure of Information, Denial of Service (DoS)
Bugtraq: [security bulletin] HPSBMU02998 rev.2 - HP System Management Homepage (SMH) running OpenSSL on Linux and Windows, Remote Disclosure of Information, Denial of Service (DoS)

[security bulletin] HPSBGN03010 rev.1 - HP Software Server Automation, "HeartBleed" OpenSSL Vulnerability, Remote Disclosure of Information
Bugtraq: [security bulletin] HPSBGN03010 rev.1 - HP Software Server Automation, "HeartBleed"OpenSSL Vulnerability, Remote Disclosure of Information

[ MDVSA-2014:079 ] json-c
Bugtraq: [ MDVSA-2014:079 ] json-c

News, Infocus, Columns, Vulnerabilities, Bugtraq ...
More rss feeds from SecurityFocus