Issues on Linux and Security
button Home

Welcome to LinuxSecure

I found some scripts on my workstation that have not been published and may be interesting for some people. Actually, I will not prepare them for publishing, but you can contact me, if you are interested in one or more of them.

  • A tool for the backup of network components. The script runs as a daemon and can be configured via config files. It reads in the config files containing the passwords of the components once, so you can store them in a crypt storage. There exist severeal templates for ssh, scp, telnet. The intention is to make automated backups from router, switches, firewalls etc.
  • Postfixanalyser was written for the trendmicro mail virusscanner. You can search for mails and you will get a status for the found mails: when did the system receive it, when was it working with the mail the last time, whats the status of the mail, where there any problem while delivering the mail. The second feature was a simple statistic: bytes and number of mails received and send, mails by status (received from extern, queued, sent to trend, received from trend, queued, delivered) and mails by problem (deferred and not sent to scanner (scanner rejected), deferred and not sent to scanner (scanner down), sent to trend, but deferred before, dereffed and not sent to extern (mta rejected), deferred and not sent to extern (mta down), sent to extern, but deferred befor).
  • A logscanner and a scanner for the checkpoint objects file.
  • A tool, that parses the registry of the genugate firewall and produces a more human readable output in html.
  • A ftp-script for the honeynet.
  • Various backupscripts in Perl and Bash.
  • Various iptables scrips.
  • A script called minilinux to create a small linux out of a huge running system.
  • Pigsparty was a small projetct that was never finished. The idea was to convert snort rule sets into iptables rule sets.
  • A snort admin interface in php.
  • A perlmodule and some programs (e.g. mfl) for the preparation and analysis of longitudinal data with a focus of same domains.

back to top

button Whats New
[2005-02-18] mp3riot version 1.3 released
[2004-10-08] mp3riot version 1.2 is out.
[2004-04-30] Added section Bridging
[2004-01-09] working progress on mp3riot version 1.2
Greg Kroah-Hartman has released stable kernel updates 4.6.3, 4.4.14, and 3.14.73. Each contains important fixes throughout the tree.
Three new stable kernels

CentOShas updated kernel(C7: multiple vulnerabilities), libxml2(C6; C7: multiple vulnerabilities), ocaml(C7: information leak), setroubleshoot(C7: multiple vulnerabilities), and setroubleshoot-plugins(C7: multiple vulnerabilities). Fedorahas updated python(F24: startTLS stripping), setroubleshoot(F24: code execution), and setroubleshoot-plugins(F24: code execution). Oraclehas updated kernel(O7: multiple vulnerabilities), libxml2(O6; O7: multiple vulnerabilities), ocaml(O7: information leak), and setroubleshoot and setroubleshoot-plugins(O7: multiple vulnerabilities). Red Hathas updated kernel(RHEL7: multiple vulnerabilities), kernel-rt(RHEL7: multiple vulnerabilities), and ocaml(RHEL7: information leak). Scientific Linuxhas updated libxml2(SL 6,7: multiple vulnerabilities) and setroubleshoot and setroubleshoot-plugins(SL7; SL6: multiple vulnerabilities). SUSEhas updated kernel(SLE11: multiple vulnerabilities).
Friday's security updates

It seems that the Comodo TLS certificate authority (CA) has filed for three trademarks using variations of "Let's Encrypt". As might be guessed, the Let's Encrypt project is less than pleasedby Comodo trying to coopt its name. "Since March of 2016 we have repeatedly asked Comodo to abandon their ?Let?s Encrypt? applications, directly and through our attorneys, but they have refused to do so. We are clearly the first and senior user of ?Let?s Encrypt? in relation to Internet security, including SSL/TLS certificates ? both in terms of length of use and in terms of the widespreadpublic association of that brand with our organization. If necessary, we will vigorously defend the Let?s Encrypt brand we?ve worked so hard to build. That said, our organization has limited resources and a protracted dispute with Comodo regarding its improper registration of our trademarks would significantly and unnecessarily distract both organizations from the core mission they should share: creating a more secure and privacy-respecting Web. We urge Comodo to do the right thing and abandon its ?Let?s Encrypt? trademark applications so we can focus all of our energy on improving the Web."[Thanks to Paul Wise.]
Defending Our Brand (Let's Encrypt)

Version 4.7 of the Xen hypervisor has been released. "With dozens of major improvements, many more bug fixes and small improvements, and significant improvements to Drivers and Devices, Xen Project 4.7 reflects a thriving community around the Xen Project Hypervisor."Some of the new features include live patching, better dom0 robustness, better migration support between non-identical hosts, scheduler improvements, and more. See the release notesfor more information.
Xen 4.7 released

Debian-LTShas updated squidguard(cross-site scripting). Fedorahas updated php-symfony-security-acl(F24: unspecified). Also, Fedora has sent out a reminderthat Fedora 22 will reach its end of life on July 19. Mageiahas updated chromium-browser-stable(multiple vulnerabilities), kernel-linus(multiple vulnerabilities, one from 2013), kernel-tmb(multiple vulnerabilities, one from 2013), libimobiledevice(socket listening on all network interfaces), and python(three vulnerabilities). openSUSEhas updated libarchive(42.1: code execution), mariadb(13.2: many unspecified vulnerabilities), and obs-service-source_validator(42.1; 13.2: code execution). Red Hathas updated libxml2(RHEL6&7: multiple vulnerabilities) and setroubleshoot and setroubleshoot-plugins(RHEL7: three vulnerabilities).
Thursday's security advisories

The Weekly Edition for June 23, 2016 is available.
[$] Weekly Edition for June 23, 2016

Back in 2009, Sony removed the "install other OS"optionfrom its PS3 game consoles, removing the ability to install Linux on those machines. It then went after developers who figured out how to jailbreak the device. Ars technica reportsthat Sony has now settled a class-action lawsuit over those actions. "Under the terms of the accord, which has not been approved by a California federal judge yet, gamers are eligible to receive $55 if they used Linux on the console. The proposed settlement, which will be vetted by a judge next month, also provides $9 to each console owner that bought a PS3 based on Sony's claims about 'Other OS' functionality."The lawyers, instead, get over $2 million.
Sony agrees to pay millions to gamers to settle PS3 Linux debacle (ars technica)

CentOShas updated setroubleshoot(C6: multiple vulnerabilities) and setroubleshoot-plugins(C6: multiple vulnerabilities). Debian-LTShas updated icedove(multiple vulnerabilities) and python2.7(three vulnerabilities). Fedorahas updated expat(F24: multiple vulnerabilities), php-zendframework-zendxml(F23; F22: insecure ciphertexts), php-ZendFramework2(F23; F22: insecure ciphertexts), and xen(F22: two vulnerabilities). openSUSEhas updated Chromium(13.1: multiple vulnerabilities), ImageMagick(Leap42.1: command execution), and vlc(Leap42.1; 13.2: multiple vulnerabilities). Oraclehas updated openssl(OL5: multiple vulnerabilities) and setroubleshoot and setroubleshoot-plugins(OL6: multiple vulnerabilities). Red Hathas updated python-django-horizon(RHOSP8.0; RHELOSP7 for RHEL7; RHELOSP6 for RHEL7; RHELOSP5 for RHEL7; RHELOSP5 for RHEL6: cross-site scripting) and setroubleshoot and setroubleshoot-plugins(RHEL6: multiple vulnerabilities).
Security advisories for Wednesday

Version 1.3 of the Elixirprogramming language has been released. "Elixir v1.3 brings many improvements to the language, the compiler and its tooling, specially Mix (Elixir?s build tool) and ExUnit (Elixir?s test framework). The most notable additions are the new Calendar types, the new cross-reference checker in Mix, and the assertion diffing in ExUnit."
Elixir v1.3 released

Not to be left behind by a certain competing project, the developers of the Flatpak packaging system have put out a press releaseproclaiming its virtues. "The Linux desktop has long been held back by platform fragmentation. This has been a burden on developers, and creates a high barrier to entry for third party application developers. Flatpak aims to change all that. From the very start its primary goal has been to allow the same application to run across a myriad of Linux distributions and operating systems. In doing so, it greatly increases the number of users that application developers can easily reach."
Announcing Flatpak

Fedorahas updated nfdump(F23; F22: multiple vulnerabilities) and webkitgtk4(F22: two vulnerabilities). openSUSEhas updated ctdb(Leap42.1, 13.2: privilege escalation), libtorrent-rasterbar(Leap42.1, 13.2: denial of service), ntp(Leap42.1: multiple vulnerabilities), and kernel(Leap42.1: multiple vulnerabilities). Red Hathas updated chromium-browser(RHEL6: multiple vulnerabilities). Slackwarehas updated libarchive(multiple vulnerabilities) and pcre(denial of service). SUSEhas updated ctdb(SLE11-SP4: privilege escalation), libimobiledevice, usbmuxd(SLE12-SP1: sockets listening on INADDR_ANY), and php53(SLES11-SP2: multiple vulnerabilities). Ubuntuhas updated dnsmasq(16.04, 15.10: denial of service), expat(two vulnerabilities), haproxy(16.04: denial of service), spice(16.04, 15.10, 14.04: two vulnerabilities), wget(code execution), and xmlrpc-c(12.04: multiple vulnerabilities).
Security updates for Tuesday

After several schedule slips, the Fedora 24 release is available. "The Fedora Project has embarked on a great journey... redefining what an operating system should be for users and developers. Such innovation does not come overnight, and Fedora 24 is one big step on the road to the next generation of Linux distributions. But that does not mean that Fedora 24 is some 'interim' release; there are great new features for Fedora users to deploy in their production environments right now!"See the Fedora 24 approved features listfor an idea of what's in this release.
Fedora 24 released

On the Project Zero blog, Jann Horn describesa bug Horn found that allows user space to overflow the kernel stack using the ecryptfs encrypted filesystem. That overflow can be used to elevate privileges for local users on Ubuntu systems configured for encrypted home directories. "However, the reason why I wrote a full root exploit for this not exactly widely exploitable bug is that I wanted to demonstrate that Linux stack overflows can occur in very non-obvious ways, and even with the existing mitigations turned on, they're still exploitable. In my bug report, I asked the kernel security list to add guard pages to kernel stacks and remove the thread_info struct from the bottom of the stack to more reliably mitigate this bug class, similar to what other operating systems and grsecurity are already doing. Andy Lutomirski had actually already started working on this, and he has now published patches that add guard pages:"
Horn: Exploiting Recursion in the Linux Kernel

The Linux networking developers have long held a strong opinion about user-space protocol implementations: they should be avoided in favor of making the in-kernel implementation better. So it might be surprising to see a veteran networking developer post a patch set aimed at making user-space implementations easier. A look at this patch and its motivations shines an interesting light on changes that are taking place in the networking world.
[$] Transport-level protocols in user space

Arch Linuxhas updated flashplugin(multiple vulnerabilities), glibc(denial of service), lib32-flashplugin(multiple vulnerabilities), lib32-glibc(denial of service), and wget(code execution). Debianhas updated libxslt(three vulnerabilities). Debian-LTShas updated firefox-esr(multiple vulnerabilities) and horizon(cross-site scripting). Fedorahas updated expat(F23: multiple vulnerabilities), GraphicsMagick(F23; F22: multiple vulnerabilities), iperf3(F23; F22: denial of service), sudo(F22: information leak), and wget(F22: code execution). Gentoohas updated dhcpcd(denial of service), ffmpeg(multiple vulnerabilities), flash-player(multiple vulnerabilities), and php(multiple vulnerabilities). openSUSEhas updated Chromium(SPH for SLE12; Leap42.1; 13.2: multiple vulnerabilities), flash-player(13.2; 13.1: multiple vulnerabilities), and poppler(Leap42.1: code execution). Scientific Linuxhas updated ImageMagick(SL6,7: multiple vulnerabilities).
Security advisories for Monday

GNU glibc 'getaddrinfo()' Function Multiple Stack Buffer Overflow Vulnerabilities
Vuln: GNU glibc 'getaddrinfo()' Function Multiple Stack Buffer Overflow Vulnerabilities

Oracle Java SE CVE-2015-4893 Remote Security Vulnerability
Vuln: Oracle Java SE CVE-2015-4893 Remote Security Vulnerability

Oracle Java SE CVE-2015-4872 Remote Security Vulnerability
Vuln: Oracle Java SE CVE-2015-4872 Remote Security Vulnerability

Oracle Java SE CVE-2015-4842 Remote Security Vulnerability
Vuln: Oracle Java SE CVE-2015-4842 Remote Security Vulnerability

#146416 Ruby:HTTP Header injection in 'net/http'
Bugtraq: #146416 Ruby:HTTP Header injection in 'net/http'

SEC Consult SA-20160624-0 :: ASUS DSL-N55U router XSS and information disclosure
Bugtraq: SEC Consult SA-20160624-0 :: ASUS DSL-N55U router XSS and information disclosure

[KIS-2016-07] SugarCRM <= 6.5.23 (SugarRestSerialize.php) PHP Object Injection Vulnerability
Bugtraq: [KIS-2016-07] SugarCRM

[KIS-2016-06] SugarCRM <= 6.5.18 (MySugar::addDashlet) Insecure fopen() Usage Vulnerability
Bugtraq: [KIS-2016-06] SugarCRM

News, Infocus, Columns, Vulnerabilities, Bugtraq ...
More rss feeds from SecurityFocus