«
Expand/Collapse
3693 items tagged "linux"
Related tags:
red hat security [+],
code versions [+],
buffer overflow [+],
sfc [+],
linux kernel [+],
linux x86 [+],
buffer overflow vulnerability [+],
security [+],
kernel [+],
tiff [+],
script [+],
red [+],
local buffer overflow [+],
full disclosure [+],
cross [+],
arbitrary code execution [+],
heap [+],
mandriva linux [+],
mandriva [+],
tiff file [+],
stack [+],
privilege escalation vulnerability [+],
local [+],
freebsd [+],
forgery [+],
aslr [+],
service vulnerability [+],
xml entities [+],
vulnerabilities [+],
udf user [+],
udf [+],
transition mechanism [+],
tcp [+],
target host [+],
system [+],
snare for linux [+],
site [+],
shared object [+],
resource function [+],
reliable [+],
recvmsg [+],
rdesktop [+],
privilege elevation [+],
postgresql [+],
poor implementation [+],
png file [+],
png [+],
payload [+],
p37 [+],
null pointer [+],
null [+],
nfs [+],
network driver ioctl [+],
network [+],
multipart form data [+],
memory management subsystem [+],
malloc function [+],
location object [+],
local privilege escalation [+],
linux distributions [+],
kernel memory [+],
kernel component [+],
iptables [+],
illinois [+],
hugepages [+],
html versions [+],
grant file [+],
gif format images [+],
freebsd security [+],
flaw [+],
exploit [+],
elevation [+],
datagram sockets [+],
database corruption [+],
cross site scripting [+],
control algorithm implementation [+],
congestion control algorithm [+],
cause denial [+],
bacula [+],
attackers [+],
assertion failure [+],
arbitrary web [+],
application [+],
denial of service [+],
linux security [+],
hacks [+],
xbox [+],
unix [+],
stack data [+],
slides [+],
security architecture [+],
ppm image [+],
poc [+],
overflow [+],
netlink [+],
netcat [+],
milosch [+],
michael steil [+],
memory safety [+],
memory corruption [+],
max [+],
madvise [+],
linux database [+],
kvm [+],
kernel stack [+],
ipv [+],
introduction [+],
integer overflow [+],
ext [+],
exploits [+],
execve [+],
execbuffer [+],
dangling pointer [+],
chaos communication congress [+],
call [+],
binfmt [+],
arm linux [+],
andy green [+],
Hardware [+],
ARM [+],
security advisory [+],
gentoo linux security [+],
gentoo [+],
web applications [+],
web [+],
videophone [+],
video [+],
unix sockets [+],
unix socket [+],
ubuntu [+],
tom vogt [+],
thrift store [+],
syn [+],
swiss army [+],
steam [+],
sql [+],
shell [+],
shaun gehring [+],
shadow [+],
serial devices [+],
serial [+],
selinux [+],
securing [+],
rules [+],
root c [+],
researchers [+],
remote security [+],
raspberry [+],
rafal wojtczuk [+],
python script [+],
python [+],
processor [+],
proc [+],
printing system [+],
printing [+],
powerful graphics [+],
playing video games [+],
player [+],
phone [+],
password disclosure [+],
password [+],
pandora radio [+],
pandora [+],
openwall [+],
office [+],
nspire [+],
novelty [+],
nostalgia [+],
neo geo [+],
neo [+],
mysql linux [+],
mmap [+],
microcontrollers [+],
matt porter [+],
management [+],
machine [+],
linux tools [+],
linux stack [+],
linux environment [+],
linux compatibility [+],
leveraging [+],
john [+],
internet radio player [+],
immunix way [+],
imaging [+],
hp linux [+],
hfs [+],
hardware hacks [+],
gpu [+],
gnu linux [+],
gnu [+],
geo [+],
force [+],
for [+],
ethtool [+],
electronics projects [+],
dissect [+],
discrete [+],
cve [+],
crispin cowan [+],
compatibility layer [+],
compatibility [+],
code execution [+],
classic arcade games [+],
chaos communication camp [+],
case [+],
cas [+],
carsten grohmann [+],
busybox [+],
bootloader [+],
bind [+],
bin [+],
beta [+],
backbox [+],
authors [+],
android [+],
amd64 [+],
alloc [+],
airplay [+],
adam outler [+],
information disclosure vulnerability [+],
vulnerability [+],
mysql [+],
kernel packages [+],
based buffer overflow [+],
local information [+],
snare [+],
shellcode [+],
zvi,
zsh,
ziv welch,
zip name,
zip,
zero,
zed attack,
youtube,
xterm,
xpath expressions,
xpath expression,
xor,
xinetd,
xfs file system,
xfs,
xen hypervisor,
xdr,
xcode,
xbee,
xattr,
xampp,
x86 linux,
x86,
x.org,
x. the,
x server,
world writable,
world andy,
working,
workbench,
workaround,
wolfgang draxinger,
wlan,
wireless network adapter,
wireless adapter,
windows,
wind speed sensor,
wind,
will,
wii remote,
wii,
wifi card,
wifi,
whoami,
whitepaper,
whirlygig,
which,
wgetsc,
wft,
westwood studios,
week,
webdav server,
webapps,
web interface,
weaknet,
warrant,
wanting,
wallie,
wall wart,
vulnerable systems,
vulnerable,
vtech,
vpn,
volume,
vmware,
vmsplice,
vlock,
vlan,
visual cue,
visit,
virus data,
virus,
virtual memory,
virtual consoles,
vinod,
vidiocsmicrocode,
video streams,
video playback,
video capabilities,
vga signals,
vga,
vfs,
version 6,
verify,
vendors,
vasiliy kulikov,
variable values,
var,
validation,
validate,
v synch,
uverbs,
utility,
usr bin,
usr,
usn,
using linux,
using a router,
usgs website,
user,
usb tv tuner,
usb network adapter,
usb interface,
usb hub,
usb enclosure,
usb device,
usb,
usa,
uri,
urgently,
update,
unwanted sound,
unsafe behavior,
unmount,
unlink,
university of munich,
uninitialized pointer,
unicode,
underflow,
unavailable web,
unauthorized access,
unauthorized,
umount,
umask,
ulrich von zadow,
uid,
udp port 68,
udp,
udev,
ubuntu linux,
type displays,
txt,
tutti,
tutorial,
turning,
tunnels,
truetype,
true randomness,
trucki,
trojan horse,
transplant,
transparent proxying,
transparent,
tpm,
toy,
touchscreen interface,
touch interface,
touch,
tor browser,
tor,
toner,
tmp,
tls protocol,
tls extension,
tipc,
tiocgicount,
timothy b. terriberry,
timo warns,
timer function,
time,
tim caswell,
tiff library,
tiff image,
thunder,
thomas pollet,
thomas polasek,
thomas biege,
thin client,
text parameter,
text,
texas instruments,
texas,
tetex,
testtrack,
testing tool,
testing,
temporary file,
tempo,
temperature,
telnet daemon,
telnet,
teaching,
tcp sockets,
tavis ormandy,
tatu ylonen,
task,
target urls,
target system,
tar,
talpa,
tail,
tablet computer,
tablet,
table,
systemtap,
systemd,
system temperature,
system kernel,
system beep,
syscall,
sys,
sync shellcode,
sync,
symlinks,
symlink attack,
syma,
suspected,
surface unit,
surface,
superh sh,
superh,
sun java runtime environment,
sun java runtime,
suid root,
suid,
sudo,
suceed,
subsystem,
struct,
strom carlson,
strom,
string parameters,
string buffer,
stop,
stm,
stk,
sticky hands,
steve grubb,
stephan mueller,
step,
stefan arentz,
start,
stack space,
stack pointer,
stack overflows,
stack overflow,
stack buffer,
sta,
ssl servers,
ssl certificates,
ssl,
ssid,
ssi directives,
ssh,
srose,
sqlalchemy,
sql query,
sql injection,
sql database,
sql commands,
sprite,
spoonwep,
spoofing,
split,
specific software,
spam,
space text,
sourceforge,
source,
sortof,
sophos,
sophisticated attacker,
sony tv,
sony atrac3,
sony,
sono,
soldering iron,
software maintenance,
snowbot,
sniffjoke,
sniffer,
sndrv,
smp systems,
smbfs,
small linux,
small,
sluggy,
slot,
sloc dos,
slave server,
sku,
sites,
single board computers,
single board computer,
singapore,
signature verification,
signature space,
signal code,
signal,
sigkill,
siemens a60,
shutter,
shutdown linux,
shutdown,
shellcoding,
shell scripts,
shell script,
shell metacharacters,
shell code,
shell arm,
shawn,
shaun clowes,
share photos,
sh4,
several attacks,
setup,
setuid,
setreuid,
setreud,
setid,
sethostname,
seth hardy,
setgid,
setdomainname,
session identifier,
session,
service,
server versions,
server hostname,
server,
serial number field,
sensor,
seneca college,
sendpage,
sendmsg,
sem,
segmentation fault,
security weakness,
security vulnerabilities,
security tasks,
security response team,
security protections,
security linux,
security hole,
security flaw,
security experience,
security enhancements,
security checks,
security checklist,
security bugs,
security breach,
security advisories,
secure,
sebastian krahmer,
search script,
search,
sdf,
sda,
sd card slot,
scummvm,
sctp,
scsi target,
scsi,
script source code,
script element,
screwdrivers,
screen space,
screen,
scott bell,
scope,
sbin,
satellite decoders,
sanity checks,
san antonio,
samsung printer,
samsung,
sam,
salve,
safer use,
ryan oneill,
ryan o neill,
running processes,
rue,
ruby,
rto,
rtl,
rpm,
rpc code,
router,
roundup,
rotor system,
rosewill,
rose protocol,
ros,
ropeadope,
rop,
rootkit,
rooting,
root user,
root shell,
root root,
root privileges,
root privilege,
root exploits,
root exploit,
root ca,
root bin,
root,
rogue server,
robot platform,
robot,
roberto paleari,
rmdir,
retired,
response capability,
resource record,
reset,
request,
remote buffer overflow vulnerability,
remote buffer overflow,
remote,
release numbers,
reiserfs,
regsets,
regression,
redhat,
red hat enterprise,
record,
reboot,
readlink,
readable permissions,
read exploit,
read,
rds,
rdf files,
rc8,
rc3,
rascal,
rants,
randomness,
randomize,
random number generator,
ramon de carvalho,
radio signals,
radio,
race,
query string,
query,
quagga,
quadcopter,
pwrite,
pwned,
purged,
pure ftpd,
pte,
psn network,
psn,
pseudorandom,
ps3,
proxy,
protocol packets,
protocol index,
protocol implementation,
protections,
protection mechanism,
protection,
proper authorization,
proof of concept,
prompt text,
project,
programming interface,
programmer,
program security,
program,
proftpd,
process dumper,
process,
privileged user,
privileged operations,
privileged guest,
privilege,
priviledges,
prints,
printer,
print,
primer,
preliminary injunction,
preinstalled,
preconceived notion,
pre,
pppol,
ppd file,
ppc port,
powerpc,
power,
pov,
potential security vulnerability,
postgresql server,
post,
port 8080,
port 520,
port,
polymorphic,
poll,
polkitd,
political scandal,
polasek,
pointer arithmetic,
pointer,
point exception,
point,
png image,
pmc,
pluggable authentication modules,
playstation 3,
playstation,
plattform,
platform,
pkt,
pkexec,
pkcs7,
pin headers,
pidmap,
pidgin,
pid,
picture,
pics,
pic microcontrollers,
phuck,
phpmyadmin,
phpdocumentor,
php scripts,
php scripting language,
php functions,
php files,
php,
phar,
personality,
perl code,
perl 5,
peripherals,
perf,
per,
pentiums,
penetration,
pear,
pdf parser,
pdf,
pci,
pcc,
patch,
passwd,
party hacks,
partition tables,
partition,
part,
parse,
parrot,
paris,
parallel ports,
parallel port,
paper,
pango,
pam,
page,
pad field,
pacman,
packs,
packetix,
packet,
package,
pack,
ownership options,
owners,
overwrite,
override,
overflows,
overflow vulnerability,
overflow condition,
outgoing tcp connections,
otheros,
osf,
os linux,
original place,
origin issues,
org,
oracle java,
openwrt,
openttd,
openssl library,
openssl,
openssh,
openslp,
openoffice,
openldap,
openbsd,
open source software packages,
open source software,
open source project,
open source program,
open,
oops,
oom,
oliver tobias ripka,
oliver tobias,
old laptop,
off,
ocsp,
ocsinventory,
ocfs,
object names,
o warrior,
nvidia linux driver,
nvidia drivers,
nvidia,
number generation,
number,
null pointer dereference,
ntp,
nsv files,
novel approach,
notification,
nook,
noob,
node,
nobel peace prize,
nntp server,
nmap,
nix,
niu,
nieces and nephews,
ngs,
nfs server,
nexus,
next,
news,
newline characters,
new,
networkmanager,
networking implementation,
network ups tools,
network traffic,
network storage servers,
network proxy,
network protocol,
network packet,
network interface card,
network analyzer,
network address translation,
netio,
netgear,
netfilter,
netcat shellcode,
netbooks,
netbook,
nelson elhage,
neil,
neat piece,
ndman,
ndiswrapper,
nci,
nc shellcode,
nbsp,
nbd,
nav,
native,
nathan,
nat,
namespace,
nameidata,
name,
music,
murder trial,
multiport,
multiple users,
multiple buffer overflow,
multiple,
multimedia installations,
multicast,
mtab,
msn code,
msata,
mremap,
mpt,
mozilla thunderbird,
mozilla firefox,
mozilla developers,
move,
mouse,
mount nfs,
mount local,
motion,
mother,
most linux distributions,
monolithic kernels,
monkey island,
money,
module,
modsecurity,
modifying,
mode creation mask,
mode,
mobile broadband,
mkdir tmp,
mkdir,
mixer,
mitigation,
mit kerberos,
missing something,
miro,
mips,
mint,
mini usb port,
mini httpd,
mike kohn,
mikael pettersson,
microsoft surface,
microsoft,
microkernel,
mick,
michael peter tags,
michael biebl,
metasploit,
meta,
mempodipper,
memory space,
memory segment,
memory regions,
memory ranges,
memory leak,
memory heap,
memory expansion,
memory exhaustion,
memory consumption,
memory buffer,
memory accesses,
memory,
memcg,
media disk,
measuring cups,
mdvsa,
mdnsresponder,
max lee,
matt richardson,
matt evans,
mathias krause,
mathematica,
mathematic,
market share,
mario gomes,
manipulations,
manipulation,
manipulatio,
mandatory access control,
mandalla,
manager,
management errors,
man,
malware,
malloc c,
mail message header,
mail message,
magenta,
mac osx,
mac os x,
mac os,
mac linux,
mac but,
mac,
lynx,
lwp file,
lvve,
low frequency,
low,
lot,
logrotate,
login,
logical volume manager,
logic analyzer,
logic,
log,
local security,
local memory,
local host,
loading,
loader,
load,
lnx,
liquid cooling,
linux wireless,
linux windows,
linux vendors,
linux systems,
linux system,
linux support,
linux solution,
linux sites,
linux servers,
linux platforms,
linux pc,
linux package,
linux os,
linux operating systems,
linux operating system,
linux on a 386,
linux network,
linux mount,
linux modules,
linux mips,
linux machines,
linux machine,
linux kernels,
linux kernel versions,
linux kernel tree,
linux kernel drivers,
linux index,
linux images,
linux host,
linux gnu,
linux game,
linux event,
linux enterprise,
linux driver,
linux drive,
linux distro,
linux distribution,
linux device driver,
linux device,
linux development,
linux desktop,
linux boxen,
linux box,
linux board,
linux based,
linux 7,
linus torvalds,
linksys nslu2,
linker,
line,
lighttpd,
light controller,
lidd,
libxml2,
libxml,
libvorbis,
libreoffice,
libpurple,
libcurl,
libavcodec,
lempel ziv,
led lamp,
led,
lease expiration,
leaps and bounds,
leapfrog,
leak,
ldm,
ld library,
lcd touch screen,
lcd modules,
lcd,
las herramientas,
laptops,
laptop,
lamp,
l4 microkernel family,
kulikov,
ksm,
ksh,
kprobe,
knfsd,
kismet wireless,
kismet,
kilobytes,
killall,
kill,
kget,
keyring,
keyctl,
keyboard shortcuts,
key,
kexec tools,
kevin dady,
kettunen,
kernels,
kernel versions,
kernel version,
kernel tree,
kernel setup,
kernel series,
kernel release,
kernel regression,
kernel proc,
kernel patch,
kernel panic,
kernel internals,
kernel implementation,
kernel drivers,
kernel code,
kernel 2,
kerberos version,
kerberos 5,
kdump,
kdc,
justin,
jumbo frame,
jumbo,
jtag,
jre,
jpc,
joystick driver,
journal,
joojoo,
jon oberheide,
john tsiombikas,
joey bernard,
joanna rutkowska,
jay fenlason,
java runtime environment,
java,
janne jansson,
isc dhcp server,
isc dhcp,
irda,
irc server,
irc,
iptables firewall,
ipt,
iproute,
ippersonality,
ipmievd,
iplog,
iphone,
iph,
ipc,
ip multicast,
ios,
iommu,
ioctl,
invalid string,
invalid pointer,
invalid,
internet storage,
internet group management protocol,
internet group management,
international components,
international color consortium,
internal storage,
interface,
interesting things,
intel i915,
intel 64,
integer overflow vulnerability,
integer,
installing linux,
installation,
install,
insight,
input validation,
input peripherals,
input devices,
input,
innotab,
injectso,
inj,
initialize,
initial sequence number,
initial character,
init function,
init,
information leak,
information gathering,
information disclosure,
information,
infocast,
inexpensive robot,
inexpensive components,
inexpensive,
inet,
index names,
index error,
index,
incrementing,
implementation,
image,
igmp,
igb,
ifconfig,
ids,
icmp,
huzaifa sidhpurwala,
https certificates,
httpd server,
http,
ht editor,
hp power,
how to,
hotkey,
hostos,
host os,
host,
hooking,
home,
holy crap,
hmid,
hijacking,
high risk,
high frequency,
hey,
help,
helmut grohne,
helicopter,
hebrew character,
heap memory,
heap corruption,
headroom,
header names,
hdtvs,
hdsp,
hdmi,
hci,
hat linux,
hat,
hashcat,
hash values,
hash table,
hash collision,
hash,
hardware portion,
hardware platform,
hardware peripherals,
hard disk space,
harald welte,
hans reiser,
handshake message,
handhelds,
handheld linux,
hal,
hacking,
hackers,
hack,
h. gunderson,
gzip,
gutterman,
guru,
guide,
guest os,
gss api,
gsm,
grub,
gross understatement,
grohne,
great forum,
gre,
graphitemaster,
graphic loading,
gpl,
gopher servers,
gopher,
gooseberry,
good starting point,
gnu tar,
gnu mailman,
gnu debugger,
gnu c library,
gnome desktop,
glsa,
glpi,
gitbrew,
ghostscript,
ghash,
gfs,
getuid,
get,
germany,
german legal system,
geohot,
generic,
gem,
gdb,
gb card,
game pad,
game emulation,
fwlogwatch,
futex,
fuse,
functionality,
functional copy,
function,
full color,
ftrace,
fsgeometry,
frequency,
freetype,
free version,
free open source software,
frame,
fpl,
foss desktop,
foss,
forward voltage,
forward message,
forkbome,
forkbombe,
forkbomb,
fork,
forensics,
forensic analysis,
fontfile,
fonera based,
folders,
folder,
florian echtler,
flavors of linux,
fix,
firmware update,
firewire,
filter image,
filter function,
filter,
filesystem,
files search,
files,
file sizes,
file security,
file pcx,
file deletion,
file,
fgx,
ffmpeg,
fernando,
ferguson,
fedora,
fbioget,
faulty release,
fasync,
fan,
face icon,
external entities,
extension,
express,
expoits,
exploiting,
exploitation,
exit shellcode,
exit,
exif,
execution stack,
exec system,
exec,
exe files,
exe,
excl,
example,
evince,
evil,
eventpoll,
evasion techniques,
evasion,
evalbot,
ethernet bridge,
ethernet,
etcshadow shellcode,
etcpasswd,
etc passwd,
espresso machine,
espeak,
escalation issues,
escalation,
error light,
error function,
eraser,
epoll,
epic time,
entropy,
enigma,
engineering,
encryption option,
elsa lancom,
elliptic curve cryptography,
ejection,
ehi,
egghunting,
egghunt,
efi,
educational toy,
edisi,
econet,
eclipse ide,
ec2,
ebtables,
earthquake data,
earthquake alert system,
earthquake,
e go,
dynamic loading,
dynamic function,
dvb,
dumper,
dual row,
dslr,
dsl,
dsa,
drop,
droid,
drm,
drivers video sis,
driver,
drive,
dresden,
download,
down,
doug ledford,
dos vulnerability,
dos badger game,
donor,
dongle,
don,
dns,
dmitry,
dll,
django,
diy tools,
distro,
dissector,
displaylink,
display software,
display,
disk,
discovery,
disclosure,
disableaslrarm shellcode,
disable,
directory traversal vulnerability,
directory traversal,
dir,
digital signature algorithm,
digital picture frame,
didj,
dhcpd,
dhcp,
device driver,
device,
development platform,
development,
developing linux applications,
dev,
desktop,
designing interactive systems,
dereference,
dependency issues,
denies,
denial of service exploit,
denial of service dos,
denial of service attacks,
denial of service attack,
denial,
demo,
demands,
dell wireless,
dell studio,
dell,
delall shellcode,
dei,
defined,
default router,
default package,
default,
debugger,
debreaker,
debian linux,
debian gnu,
debian,
deactivation,
de carvalho,
dccp,
dbd pg,
day,
david mandalla,
david koblas,
datagram congestion control protocol,
database users,
database structure,
database,
data corruption,
dash,
darwin,
daniel paluska,
dan rosenberg,
dan jacobson,
dallas,
dalili,
dady,
cyrus sasl,
cyrus imap server,
cyrus imap,
custom kernel,
culture event,
cuda,
csh,
cs4,
cryptoloop,
creation vulnerability,
crash course,
crash,
cpu utilization,
cpu cycles,
cpu consumption,
cpu clock,
cpu,
course management system,
course authors,
course,
cortex,
core control,
core c,
copter,
controller area network,
controller,
control,
consumption issues,
conntrack,
connector,
connectback,
connect system,
connect,
conky,
condition,
computing base,
computer,
compression algorithm,
compilation,
compat,
commodity hardware,
commands,
command execution,
command,
comedi,
color,
code encryption,
code,
cname record,
clone,
clock event,
clock,
client credentials,
client authentication,
client,
clear,
classic,
class action lawsuit,
clam antivirus,
cisco pix,
cisco ios,
cisco aironet,
cifsfindnext,
cifs,
chumby,
chuck willis tags,
chuck willis,
christina,
christian,
christens,
chris evans,
chris bryden,
chris,
chown root,
chown,
chmod 777,
chmod,
chips,
chip,
chelsio,
checklist,
check security,
chdir,
character encodings,
change mode,
change,
cgi perl module,
certificate authorities,
cellphones,
cellphone,
cdrom,
cdr,
cdda,
cat,
card,
capability,
cap,
cant lock,
canonical,
can haz modharden,
camera,
caiaq,
cache manager,
c ping,
c linux,
c library,
c exploit,
c code,
c bridge,
c bindings,
bytes,
bytebinsh shellcode,
byte,
bunny,
bunnie,
bundle,
building,
bugtraq,
buffer overflows,
buffer overflow vulnerabilities,
buffer overflow tutorial,
buffer overflow bug,
buffer,
buenas,
buck bunny,
btrfs,
bt4,
bsd derived,
bsd,
bryden,
brute,
browser engine,
broadband,
brief,
bridge,
brace expansion,
boston,
booty,
boot,
bonus,
bomb,
board,
bluetooth,
blowfish encryption,
block,
blk,
blind,
blair,
blackhole,
black hat,
bit,
bindshell,
bindport,
bind 9,
binary,
binaries,
bilal chishti,
bigdecimal class,
bigdecimal,
bfa,
beta3,
beta version,
best buy,
ben nanonote,
ben hutchings,
ben hawkes,
beep,
beefs,
beaglebone,
beagleboard,
bcm,
bash,
badger,
backshell tcp,
backshell,
backdoor,
backconnect,
back,
azx,
avr programmer,
avg,
auto,
augen,
auerswald,
audio,
attribute,
attacks,
attacker,
attack,
ati,
atheros,
atheme,
astaro security linux,
astaro,
aspire,
ash,
ascii,
art,
array length,
array index,
armor protection,
armor,
armbinsh shellcode,
aristide fattori,
arduino,
arch,
arbitrary system,
arbitrary html,
arbitrary files,
arbitrary code,
arabic x,
april first,
april 1,
application protocols,
application crashes,
application crash,
appletalk,
apple mjpeg b,
apple,
apparmor,
apartment in singapore,
apache tomcat 5,
apache tomcat,
apache http server,
apache,
anyone,
antonio,
anti virus,
anti,
anne van kesteren,
andy adamson,
andrew peng,
andrew griffiths,
andrew,
and,
analyzer,
alsa,
alpha specific,
alert,
alasdair kergon,
agpioc,
advisory updates,
advisory,
adobe reader,
adobe flash player,
administrator privileges,
addendum,
adam lackorzynski,
acpid,
acpi,
acl,
acer,
account takeover,
access control list,
access,
abstract time,
abhishek arya,
abftw,
aaaa,
Weekly,
Support,
Soporte,
Software,
Release,
Rasberry,
Programming,
Pentesting,
Newbie,
Howto,
Final,
BackTrack,
Area,
Angolo,
802 11b,
3d shutter glasses
Skip to page:
1
2
3
...
15
-
-
10:01
»
Hack a Day
Not every programmer likes creating GUI code. Most hacker types don’t mind a command line interface, but very few ordinary users appreciate them. However, if you write command line programs in Python, Gooey can help. By leveraging some Python features and a common Python idiom, you can convert a command line program into a GUI with very little effort.
The idea is pretty simple. Nearly all command line Python programs use argparse
to simplify picking options and arguments off the command line as well as providing some help. The Gooey decorator picks up all your options and arguments and creates a GUI for it. You can make it more complicated if you want to change specific things, but if you are happy with the defaults, there’s not much else to it.
At first, this article might seem like a Python Fu and not a Linux Fu, since — at first — we are going to focus on Python. But just stand by and you’ll see how this can do a lot of things on many operating systems, including Linux.
Hands On
We had to try it. Here’s the code from the argparse
manual page, extended to live inside a main function:
import argparse
def main():
  parser = argparse.ArgumentParser(description='Process some integers.')
  parser.add_argument('integers', metavar='N', type=int, nargs='+',
     help='an integer for the accumulator')
  parser.add_argument('--sum', dest='accumulate', action='store_const',
    const=sum, default=max,
  help='sum the integers (default: find the max)')
  args = parser.parse_args()
  print(args.accumulate(args.integers))
main()
You can run this at the command line (we called it iprocess.py):
python iprocess.py 4 33 2
python iprocess.py --sum 10 20 30
In the first case, the program will select and print the largest number. In the second case, it will add all the arguments together.
Creating a GUI took exactly two steps (apart from installing Gooey): First, you import Gooey at the top of the file:
from gooey import Gooey
Then add the decorator @Gooey on the line before the main definition (and, yes, it really needs to be on the line before, not on the same line):
@Gooey
def main():
The result looks like this:

You might want to tweak the results and you can also add validation pretty easily so some fields are required or have to contain particular types of data.
Sure That Works on Linux, But…
Python, of course, runs on many different platforms. So why is this part of Linux Fu? Because you can easily use it to launch any command line program. True, that also should work on other operating systems, but it is especially useful on Linux where there are so many command line programs.
We first saw this done on Chris Kiehl’s blog where he does a GUI — or Gooey, I suppose — for ffmpeg which has a lot of command line options. The idea is to write a simple argparse set up for the program and then tell GUI what executable to actually launch after assembling the command line.

Here’s Chris’ code:
from gooey import Gooey, GooeyParser
@Gooey(target="ffmpeg", program_name='Frame Extraction v1.0', suppress_gooey_flag=True)
def main():
parser = GooeyParser(description="Extracting frames from a movie using FFMPEG")
ffmpeg = parser.add_argument_group('Frame Extraction Util')
ffmpeg.add_argument('-i',
metavar='Input Movie',
help='The movie for which you want to extract frames',
widget='FileChooser')
ffmpeg.add_argument('output',
metavar='Output Image',
help='Where to save the extracted frame',
widget='FileSaver')
ffmpeg.add_argument('-ss',
metavar='Timestamp',
help='Timestamp of snapshot (in seconds)')
ffmpeg.add_argument('-frames:v',
metavar='Timestamp',
default=1,
gooey_options={'visible': False})
parser.parse_args()
if __name__ == '__main__':
main()
You even have the option of creating a JSON file that Gooey can read if you don’t want to write Python. The utility of this is easy to see, but I’d love to hear some concrete examples of where you think it will come in handy. If you’re already using Gooey, or plan to give it a shot after reading this article, let us know in the comments below.
Of course, not all Python GUIs are created equal. Neither are all Python graphics.
-
-
19:00
»
Hack a Day
These days, working with a display in software is fairly easy. Thanks to the convenience of the modern OS, we’re blessed with graphical user interfaces, where things such as buttons and windows and text are all taken care of for us. Of course, once you start to wander off the beaten track, particularly in embedded systems with no GUI, things can get a little more difficult. For these situations, [JSBattista] wrote some code to blast text directly to the Linux framebuffer.
It’s a project borne out of necessity. Working with a Raspberry Pi with no X server, it was found that the console text size made it difficult to display data. By writing directly to the framebuffer, it would be possible to display text of a larger size without having to implement a full GUI, and overheads could be kept to a minimum.
Working in this manner comes with some limitations. Glyphs are taken from an array in bitmap format, rather than font files. In this case, a font akin to that of the Alien sentry gun interface was chosen, for an attractive sci-fi look. Lowercase characters are currently unimplemented. Testing thus far has been on Raspberry Pi and Beaglebone non-GUI systems, with performance varying depending on platform.
It’s a project we suspect might prove useful to the developers of lightweight embedded systems. It’s something that may take some tweaking and experimentation to implement, but the hacker set rarely shy away from a challenge. If you’re eager to get down and dirty with some heavy programming, this tutorial on Linux graphics will help.
-
-
19:00
»
Hack a Day
[Drew DeVault] recently wrote up some interesting instructions on how to package up interactive text-based Linux commands for users to access via ssh. At first, this seems simple, but there are quite a few nuances to it and [Drew] does a good job of covering them.
One easy way — but not very versatile — is to create a user and make the program you want to run the default shell. The example used is to make /usr/bin/nethack the shell and now people can log in as that user and play nethack. Simple, right? However, there are better ways to get there.
There are a few problems. First, if the user passes a command line to a program like nethack, things get confused. However, you can add a statement to the .ssh/authorized_keys file that selects a command to run using a real shell upon login. You can set the shell to something simple like /bin/sh or rbash (restricted bash) and use that to launch nethack or the binary of your choice. A restricted shell prevents users from doing things such as changing directories, setting certain environment variables, and more. It offers some level of safety against malicious activity, although perhaps not serious malicious activity.
Just to round out the example, [Drew] shows how he applies these ideas to a real working system. He has a series of Python scripts that work with Sourcehut continuous integration builds.
We love little ssh tools. While we like ssh, if you have an unreliable connection, you might prefer Mosh.
-
-
1:00
»
Hack a Day
When your thermostat comes with Linux running on it, that’s not a hack. When it doesn’t, and you get Linux on there yourself, it most definitely is. This is exactly what [cz7asm] has done. In a recent video, he shows the Honeywell thermostat booting Linux and running a wide range of software.
While the hardware inside the thermostat doesn’t afford all the luxuries of a typical modern embedded Linux, it’s got enough room for the basics. The system runs from a 1 MB rootfs in RAM, and has a 2.5 MB kernel image, leaving a spare 12 MB for everything else. With just these meager resources, [cz7asm] shows how the system can use a USB network adapter, connecting to telehack.com for some command-line retro fun, and host a web server, although no browser runs yet. There’s also framebuffer support for displaying graphics and animations, and the usual Linux terminal goodness.
All we’ve seen so far is the video, so we hope [cz7asm] posts the code somewhere, because we’re tired of using our thermostat just to run the AC.
You might remember [cz7asm] from his previous thermostatic triumph: running Doom. Check out the video of the latest thermostat adventure after the break.
Thanks to [Piecutter] for the tip!
-
-
19:01
»
Hack a Day
Getting a home music streaming system off the ground is typically a straightforward task. Using Apple devices with Airplay makes this task trivial, but if you’re a computing purist like [Connor] who runs a Linux machine and wants to keep it light on extra packages, the task gets complicated quickly. His goal is to bring audio streaming to all Linux platforms without the need to install a lot of extra software. This approach is friendly to light-footprint devices like the Raspberry Pi that he used in his proof of concept.
[Connor] created a set of scripts which allow streaming from any UNIX (or UNIX-like) machines, using only dependencies that a typical OS install would already have. His Raspberry Pi is the base station and streams to his laptop, but he notes that this will work between virtually any UNIX or Linux machine. The only limitation is what FFmpeg can or can’t play.
We definitely can appreciate a principled approach to software and its use, although it does seem that most people don’t have this issue at the forefront of their minds. This results in a lot of software that is bulky, making it difficult to maintain, use, or even know what it does, and also makes it harder for those of us that don’t want to use that type of software to find working solutions to other problems. It’s noble that [Connor] was able to create something without sacrificing any principles.
-
-
19:00
»
Hack a Day
Audio systems in Linux are terrible. You’ve never known true pain until you’ve tried to set up a recording or broadcasting workstation running Linux. I did, twenty years ago, and nothing has changed since. This wasn’t really a problem when Linux was either used in server spaces or some nerd’s battle station, but now we have small single board computers that everyone uses and wants to turn into a modular synth. Welcome to paintown, because the Linux audio stack is terrible.
For the past ten years, [Dynobot] has been working on improving audio in Linux. This is a decade of reading manuals from IBM and Oracle, and a deep knowledge of how to adjust settings so audio actually works. All of this work is now combined into a single script that improves everything. This means the priority of the Audio group is changed, the thread priority is better, the latency is better, and for anyone who wants to set up a local streaming service, the network latency is better. It’s not everything, and there’s no mention of recording multitrack audio, but we’ll accept the baby steps here.
There are two relevant Github repositories for this, the first containing audio adjustments for Debian-based systems, including the Raspberry Pi. This should work on any single board computer running Debian, and has been tested on all the Raspberry Pis, the Allo Sparky, ASUS Tinkerboard, and the Odroid C2. There’s also a version for TinyCore-based Linux systems that improves the priority of the audio threads, changes the thread scheduling from ‘whatever’ to FIFO, and improves the latency. If you’re running Linux, and you’re doing something with audio, this is what you need.
-
-
4:01
»
Hack a Day
The fragility of SD cards is the weak link in the Raspberry Pi ecosystem. Most of us seem to have at least one Pi tucked away somewhere, running a Magic Mirror, driving security cameras, or even taking care of a media library. But chances are, that Pi is writing lots …read more
-
-
11:31
»
Hack a Day
If you grew up with Unix systems like we did, you’ll be sorry to hear the news: vi, the noble text editor that has served us so well these 40 years, is going away — from many GNU/Linux systems, anyway. As of this writing, GNU/Linux Mint, Debian, Ubuntu, and OpenSUSE …read more
-
-
1:00
»
Hack a Day
[Marek Gibney] poses an interesting puzzle. What does the following bash command line print?
( echo red ; echo green 1>&2 ) | echo blue
You’d like to think it prints three lines: red, green, and blue. But would you be surprised to find out that it can sometimes output …read more
-
-
4:00
»
Hack a Day
Although many people think of Linux-based operating systems as graphical, really that GUI is just another application running over the bare operating system. Power users, remote administrators, and people running underpowered computers like a Raspberry Pi have a tendency to do more with command line tools. [Igor] did a FOSDEM19 presentation you can see below about how he’s providing web-like services to the command line using web servers and curl as a client.
This is subtly different from just accessing an ordinary web server via curl. The output is meant for display in the terminal. Of course, you could also …read more
-
-
19:00
»
Hack a Day
When we first saw [Ben Jojo’s] post about the Internet inside EvE Online, we didn’t think we’d be that interested. We don’t play EvE — a massively multiplayer game. But it turns out, the post is really about understanding BGP (Border Gateway Protocol) and how it helps route traffic in large networks. The best part? He actually simulates a network with 8,000 nodes to test out what he’s talking about.
Obviously, you wouldn’t want to fire up 8,000 Raspberry Pi computers for such an experiment. Using Buildroot, he set up a very small Linux image that had the bare minimum …read more
-
-
1:00
»
Hack a Day
It seems like only yesterday that the Linksys WRT54G and the various open source firmware replacements for it were the pinnacle of home router hacking. But like everything else, routers have gotten smaller and faster over the last few years. The software we run on them has also gotten more advanced, and at this point we’ve got routers that you could use as a light duty Linux desktop in a pinch.
But even with no shortage of pocket-sized Linux devices in our lives, the GL-USB150 “Microrouter” that [Mason Taylor] recently brought to our attention is hard to ignore. Inside this …read more
-
-
10:00
»
Hack a Day
In an earlier installment of Linux Fu, I mentioned how you can use inotifywait
to efficiently watch for file system changes. The comments had a lot of alternative ways to do the same job, which is great. But there was one very easy-to-use tool that didn’t show up, so I wanted to talk about it. That tool is entr
. It isn’t as versatile, but it is easy to use and covers a lot of common use cases where you want some action to occur when a file changes.
The program is dead simple. It reads a list of file …read more
-
-
4:00
»
Hack a Day
If you think about it, an operating system kernel is really just a very powerful shared library that offers services to many programs. Of course, it is a very powerful library, but still — its main purpose is to provide services to programs. Your program probably doesn’t use all of the myriad services the kernel provides. Even a typical system might not fully use all the things that are in a typical kernel. Red Hat has a new initiative to bring a technology called unikernels to the forefront. A unikernel is a single application linked with just enough of the …read more
-
-
7:01
»
Hack a Day
One of the things that’s nice about Linux or Unix compared to many other operating systems is there’s a good chance a Linux program will spew out informational messages to a log somewhere. Many commands even have a way to turn on more logs. I know that Windows has the event viewer, but many programs don’t have much to say which makes it difficult to know what’s happening when things go wrong.
The problem is, sometimes programs tell you too much information. How do you find what you want to know? It looks cool on a movie where the hacker …read more
-
-
8:01
»
Hack a Day
Linux started as a student project in the 1990s, the creation of Linus Torvalds. He has attained celebrity status while steering his creation through the decades, but along the way he has also attracted a different reputation within the Linux and software community. He is famous for his outbursts and rants, some of which become rather personal, and it is not difficult at all to find kernel developers or would-be kernel developers who have turned their backs on the project as a result.
It’s very refreshing indeed then to read an update from [Linus] as part of his regular communications, …read more
-
-
19:00
»
Hack a Day
If you use Linux and its associated tools on the desktop or on a Raspberry Pi, or on a server, you probably have used the command line. Some people love it and some people hate it. However, many of us have been using Linux for years and sometimes Unix before that, and we tend to use the same old tried-and-true tools. [Remy Sharp] had a recent post talking about how he had created aliases to replace those old tools with great modern replacements and it is definitely worth a read.
We’ll be honest, when we first saw the post we …read more
-
-
4:01
»
Hack a Day
If you haven’t kept up with the world of e-ink displays, here’s some good news: they are pretty cheap now. For as little as $15 you can get a small e-ink display that has good enough performance and contrast to actually do something useful. There’s only one problem: figuring out how to drive them in your project.
Tired of seeing nothing but wiring diagrams and sample code when it came to actually putting these e-ink modules to use, [Jouko Strömmer] decided to try his hand at creating a turn-key application for these gorgeous little displays. The result is PaperTTY, a …read more
-
-
16:00
»
Hack a Day
These days a printer — especially one at home — is likely to spray ink out of nozzles. It is getting harder to find home laser printers, and earlier printer technologies such as dot matrix are almost gone from people’s homes even if you’ll still see a few printing multipart forms in some offices.
[Thomas Winningham] bought an old Commodore dot matrix printer in a fast food parking lot for $20. How hard could it be to get it working? How hard, indeed. Check out the video below to see the whole adventure. The principle behind the printer is simple …read more
-
-
1:00
»
Hack a Day
When we lose a limb, the brain is really none the wiser. It continues to send signals out, but since they no longer have a destination, the person is stuck with one-way communication and a phantom-limb feeling. The fact that the brain carries on has always been promising as far as prostheses are concerned, because it means the electrical signals could potentially be used to control new limbs and digits the natural way.
It’s also good news for adding a sense of touch to upper-limb prostheses. Researchers at Johns Hopkins university have spent the last year testing out their concept …read more
-
-
19:00
»
Hack a Day
In what is probably this century’s greatest advancement in technology, Windows Notepad now supports Unix line endings. This is it, people. Where were you when Kennedy was assassinated? Where were you when Neil Armstrong set foot on the moon? Where were you when Challenger blew up? Where are you now?
Previously, Windows Notepad only supported Windows End of Line Characters — a Carriage Return (CR) and Line Feed (LF). Unix text documents use LF for line endings, and Macs use CR for line endings. The end result of this toppling of the Tower of Babel for End of Line characters …read more
-
-
22:00
»
Hack a Day
When we say “hack” here we most often mean either modifying something to do something different or building something out of parts. But as we build more Internet-connected things, it is worthwhile to think about the other kind of hack where people gain unauthorized access to a system. For example, you wouldn’t think a remote control would be a big deal for hackers. But the Logitech Harmony Hub connects to the Internet and runs Linux. What’s more is it can control smart devices like door locks and thermostats, so hacking it could cause problems. FireEye’s Mandian Red Team set out …read more
-
-
11:14
»
Hack a Day
[Shaun Gehring] wanted an Internet radio player. Although he did have some troubles along the way, the final project turned out very well. Housed inside this case which used to house a spindle of bland CDs is a Raspberry Pi that plays Pandora radio and serves as an AirPlay receiver. The GPIO header of the [...]
-
-
16:04
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2013-001 - Versions of GnuPG less than or equal to 1.4.12 are vulnerable to memory access violations and public keyring database corruption when importing public keys that have been manipulated. An OpenPGP key can be fuzzed in such a way that gpg segfaults when importing the key. The updated packages have been patched to correct this issue.
-
16:04
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2013-001 - Versions of GnuPG less than or equal to 1.4.12 are vulnerable to memory access violations and public keyring database corruption when importing public keys that have been manipulated. An OpenPGP key can be fuzzed in such a way that gpg segfaults when importing the key. The updated packages have been patched to correct this issue.
-
16:04
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2013-001 - Versions of GnuPG less than or equal to 1.4.12 are vulnerable to memory access violations and public keyring database corruption when importing public keys that have been manipulated. An OpenPGP key can be fuzzed in such a way that gpg segfaults when importing the key. The updated packages have been patched to correct this issue.
-
-
10:01
»
Hack a Day
In case you weren’t aware, there’s a new Neo Geo console on the block. It’s called the Neo Geo X and brings back more than a few pains of nostalgia for classic arcade games of the 90s. After receiving their brand new Neo Geo portables, members of the Neo Geo forum decided to do a [...]
-
-
16:00
»
SecuriTeam
MySQL (Linux) Database suffers from Privilege Elevation Zeroday Exploit .
-
8:59
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-184 - A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. The updated packages have been patched to correct this issue.
-
8:59
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-184 - A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. The updated packages have been patched to correct this issue.
-
8:59
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-184 - A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. The updated packages have been patched to correct this issue.
-
8:59
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-184 - A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. The updated packages have been patched to correct this issue.
-
-
16:00
»
SecuriTeam
Snare for Linux Cross-Site Scripting via Log Injection Vulnerability
-
-
16:03
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-183 - A vulnerability has been discovered and corrected in ModSecurity versions 2.6.8 and below. These versions are vulnerable to multipart/invalid part ruleset bypass and were fixed in 2.7.0. The updated packages have been patched to correct this issue.
-
16:03
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-183 - A vulnerability has been discovered and corrected in ModSecurity versions 2.6.8 and below. These versions are vulnerable to multipart/invalid part ruleset bypass and were fixed in 2.7.0. The updated packages have been patched to correct this issue.
-
16:03
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-183 - A vulnerability has been discovered and corrected in ModSecurity versions 2.6.8 and below. These versions are vulnerable to multipart/invalid part ruleset bypass and were fixed in 2.7.0. The updated packages have been patched to correct this issue.
-
15:25
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-182 - Multiple vulnerabilities has been discovered and corrected in ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting attacks.
-
15:25
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-182 - Multiple vulnerabilities has been discovered and corrected in ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting attacks.
-
15:25
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-182 - Multiple vulnerabilities has been discovered and corrected in ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting attacks.
-
-
11:05
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-181 - Multiple host header poisoning flaws were found and fixed in Django. The updated packages have been upgraded to the 1.3.5 version which is not affected by these issues.
-
11:05
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-181 - Multiple host header poisoning flaws were found and fixed in Django. The updated packages have been upgraded to the 1.3.5 version which is not affected by these issues.
-
11:05
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-181 - Multiple host header poisoning flaws were found and fixed in Django. The updated packages have been upgraded to the 1.3.5 version which is not affected by these issues.
-
-
21:36
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1589-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: A flaw was found in the way the Linux kernel's dl2k driver, used by certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local, unprivileged user could use this flaw to issue potentially harmful IOCTLs, which could cause Ethernet adapters using the dl2k driver to malfunction.
-
21:36
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1589-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: A flaw was found in the way the Linux kernel's dl2k driver, used by certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local, unprivileged user could use this flaw to issue potentially harmful IOCTLs, which could cause Ethernet adapters using the dl2k driver to malfunction.
-
21:36
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1589-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: A flaw was found in the way the Linux kernel's dl2k driver, used by certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local, unprivileged user could use this flaw to issue potentially harmful IOCTLs, which could cause Ethernet adapters using the dl2k driver to malfunction.
-
21:34
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1580-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the RHSA-2012:0862 update did not correctly fix the CVE-2011-4131 issue. A malicious Network File System version 4 server could return a crafted reply to a GETACL request, causing a denial of service on the client. A divide-by-zero flaw was found in the TCP Illinois congestion control algorithm implementation in the Linux kernel. If the TCP Illinois congestion control algorithm were in use, a local, unprivileged user could trigger this flaw and cause a denial of service.
-
21:34
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1580-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the RHSA-2012:0862 update did not correctly fix the CVE-2011-4131 issue. A malicious Network File System version 4 server could return a crafted reply to a GETACL request, causing a denial of service on the client. A divide-by-zero flaw was found in the TCP Illinois congestion control algorithm implementation in the Linux kernel. If the TCP Illinois congestion control algorithm were in use, a local, unprivileged user could trigger this flaw and cause a denial of service.
-
21:34
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1580-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the RHSA-2012:0862 update did not correctly fix the CVE-2011-4131 issue. A malicious Network File System version 4 server could return a crafted reply to a GETACL request, causing a denial of service on the client. A divide-by-zero flaw was found in the TCP Illinois congestion control algorithm implementation in the Linux kernel. If the TCP Illinois congestion control algorithm were in use, a local, unprivileged user could trigger this flaw and cause a denial of service.
-
-
16:00
»
SecuriTeam
The Linux kernel is prone to a local denial-of-service vulnerability.
-
15:55
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-180 - CGI.pm module before 3.63 for Perl does not properly escape newlines in P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. The updated packages have been patched to correct this issue.
-
15:55
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-180 - CGI.pm module before 3.63 for Perl does not properly escape newlines in P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. The updated packages have been patched to correct this issue.
-
15:55
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-180 - CGI.pm module before 3.63 for Perl does not properly escape newlines in P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. The updated packages have been patched to correct this issue.
-
-
16:40
»
Packet Storm Security Exploits
On some default Linux installations of PostgreSQL, the postgres service account may write to the /tmp directory, and may source UDF Shared Libraries from there as well, allowing execution of arbitrary code. This Metasploit module compiles a Linux shared object file, uploads it to the target host via the UPDATE pg_largeobject method of binary injection, and creates a UDF (user defined function) from that shared object. Because the payload is run as the shared object's constructor, it does not need to conform to specific Postgres API versions.
-
16:40
»
Packet Storm Security Recent Files
On some default Linux installations of PostgreSQL, the postgres service account may write to the /tmp directory, and may source UDF Shared Libraries from there as well, allowing execution of arbitrary code. This Metasploit module compiles a Linux shared object file, uploads it to the target host via the UPDATE pg_largeobject method of binary injection, and creates a UDF (user defined function) from that shared object. Because the payload is run as the shared object's constructor, it does not need to conform to specific Postgres API versions.
-
16:40
»
Packet Storm Security Misc. Files
On some default Linux installations of PostgreSQL, the postgres service account may write to the /tmp directory, and may source UDF Shared Libraries from there as well, allowing execution of arbitrary code. This Metasploit module compiles a Linux shared object file, uploads it to the target host via the UPDATE pg_largeobject method of binary injection, and creates a UDF (user defined function) from that shared object. Because the payload is run as the shared object's constructor, it does not need to conform to specific Postgres API versions.
-
16:01
»
Hack a Day
Powerful graphics cards are pretty affordable these days. Even though we rarely do high-end gaming on our daily machine we still have a GeForce 9800 GT. That goes to waste on a machine used mainly to publish posts and write code for microcontrollers. But perhaps we can put the GPU to good use when it comes [...]
-
-
22:17
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-179 - CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface. The updated packages have been patched to correct this issue.
-
22:17
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-179 - CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface. The updated packages have been patched to correct this issue.
-
22:17
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-179 - CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface. The updated packages have been patched to correct this issue.
-
-
16:00
»
SecuriTeam
FreeBSD is prone to a local privilege-escalation vulnerability.
-
15:23
»
Packet Storm Security Advisories
Snare for Linux suffers from a cross site request forgery vulnerability due to a poor implementation of the ChToken. All versions prior to 1.7.0 are vulnerable.
-
15:23
»
Packet Storm Security Recent Files
Snare for Linux suffers from a cross site request forgery vulnerability due to a poor implementation of the ChToken. All versions prior to 1.7.0 are vulnerable.
-
15:23
»
Packet Storm Security Misc. Files
Snare for Linux suffers from a cross site request forgery vulnerability due to a poor implementation of the ChToken. All versions prior to 1.7.0 are vulnerable.
-
-
19:20
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-178 - Stack-based buffer overflow in MySQL 5.5.19, 5.1.53, and possibly other versions, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. The updated packages have been patched to correct this issue.
-
19:20
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-178 - Stack-based buffer overflow in MySQL 5.5.19, 5.1.53, and possibly other versions, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. The updated packages have been patched to correct this issue.
-
19:20
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-178 - Stack-based buffer overflow in MySQL 5.5.19, 5.1.53, and possibly other versions, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command. The updated packages have been patched to correct this issue.
-
-
16:00
»
SecuriTeam
The Linux kernel is prone to an information-disclosure vulnerability.
-
-
21:28
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-177 - BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service vector against affected servers. The updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue.
-
21:28
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-177 - BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service vector against affected servers. The updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue.
-
21:28
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-177 - BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service vector against affected servers. The updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue.
-
8:39
»
Hack a Day
[Adam Outler] shows us how to expand the Linux tools available on Android without rooting the device. He does this by installing BusyBox. The binary is copied to the device using the Android Developer Bridge. He then opens an ADB shell, adds execution permissions to the binary, and runs it. BusyBox calls itself the Swiss Army [...]
-
-
18:00
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-176 - A heap-buffer overflow was found in the way libxml2 decoded certain XML entities. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application. The updated packages have been patched to correct this issue.
-
18:00
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-176 - A heap-buffer overflow was found in the way libxml2 decoded certain XML entities. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application. The updated packages have been patched to correct this issue.
-
18:00
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-176 - A heap-buffer overflow was found in the way libxml2 decoded certain XML entities. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application. The updated packages have been patched to correct this issue.
-
-
11:22
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-175 - Multiple double free(), buffer overflow, invalid free() and improper overflow checks vulnerabilities were found and corrected in libssh. The updated packages have been upgraded to the 0.5.3 version which is not affected by these issues.
-
11:22
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-175 - Multiple double free(), buffer overflow, invalid free() and improper overflow checks vulnerabilities were found and corrected in libssh. The updated packages have been upgraded to the 0.5.3 version which is not affected by these issues.
-
11:22
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-175 - Multiple double free(), buffer overflow, invalid free() and improper overflow checks vulnerabilities were found and corrected in libssh. The updated packages have been upgraded to the 0.5.3 version which is not affected by these issues.
-
-
16:00
»
SecuriTeam
The Linux kernel is prone to a local denial-of-service vulnerability.
-
-
9:21
»
Packet Storm Security Advisories
FreeBSD Security Advisory - FreeBSD is binary-compatible with the Linux operating system through a loadable kernel module/optional kernel component. A programming error in the handling of some Linux system calls may result in memory locations being accessed without proper validation. It is possible for a local attacker to overwrite portions of kernel memory, which may result in a privilege escalation or cause a system panic.
-
9:21
»
Packet Storm Security Recent Files
FreeBSD Security Advisory - FreeBSD is binary-compatible with the Linux operating system through a loadable kernel module/optional kernel component. A programming error in the handling of some Linux system calls may result in memory locations being accessed without proper validation. It is possible for a local attacker to overwrite portions of kernel memory, which may result in a privilege escalation or cause a system panic.
-
9:21
»
Packet Storm Security Misc. Files
FreeBSD Security Advisory - FreeBSD is binary-compatible with the Linux operating system through a loadable kernel module/optional kernel component. A programming error in the handling of some Linux system calls may result in memory locations being accessed without proper validation. It is possible for a local attacker to overwrite portions of kernel memory, which may result in a privilege escalation or cause a system panic.
-
-
14:22
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-174 - Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format. ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow. The updated packages have been patched to correct these issues.
-
14:22
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-174 - Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format. ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow. The updated packages have been patched to correct these issues.
-
-
15:42
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-173 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Atte Kettunen from OUSPG used the Address Sanitizer tool to discover a buffer overflow while rendering GIF format images. This issue is potentially exploitable and could lead to arbitrary code execution. Various other issues were also addressed.
-
15:42
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-173 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Atte Kettunen from OUSPG used the Address Sanitizer tool to discover a buffer overflow while rendering GIF format images. This issue is potentially exploitable and could lead to arbitrary code execution. Various other issues were also addressed.
-
15:42
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-173 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Atte Kettunen from OUSPG used the Address Sanitizer tool to discover a buffer overflow while rendering GIF format images. This issue is potentially exploitable and could lead to arbitrary code execution. Various other issues were also addressed.
-
15:56
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1481-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's dl2k driver, used by certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local, unprivileged user could use this flaw to issue potentially harmful IOCTLs, which could cause Ethernet adapters using the dl2k driver to malfunction.
-
15:56
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1481-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's dl2k driver, used by certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local, unprivileged user could use this flaw to issue potentially harmful IOCTLs, which could cause Ethernet adapters using the dl2k driver to malfunction.
-
15:56
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1481-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's dl2k driver, used by certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local, unprivileged user could use this flaw to issue potentially harmful IOCTLs, which could cause Ethernet adapters using the dl2k driver to malfunction.
-
9:01
»
Hack a Day
Often when we see projects using embedded Linux we think of them as not being hardware hacks. But this is a horse of an entirely different color. [Matt Porter] is leveraging a little known feature to directly access a 6502 processor from inside a Linux environment. In other words, this hack lets you write code [...]
-
-
16:00
»
SecuriTeam
The Linux kernel is prone to a local information-disclosure vulnerability.
-
13:43
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-172 - Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file. The updated packages have been patched to correct this issue.
-
13:43
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-172 - Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file. The updated packages have been patched to correct this issue.
-
13:43
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-172 - Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file. The updated packages have been patched to correct this issue.
-
-
12:01
»
Hack a Day
Not knowing what’s going on inside of your electronics projects can make it quite difficult to get the bugs out. [John] was bumping up against this problem when working on wireless communications between several devices. At just about the same time his friend came up with a script with lets you monitor multiple serial devices in one [...]
-
-
3:01
»
Hack a Day
It’s great to see Linux running on a device in a way that was never intended. [tangrs] has successfully run a Linux kernel on the ARM based Nspire CAS CX graphing calculator. He’s developed an in-place bootloader that allows a kernel to be loaded from within the stock Nspire OS. It also allows for peeking and poking [...]
-
-
7:10
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-171 - A buffer overflow flaw was found in the IcedTea-Web plug-in. Visiting a malicious web page could cause a web browser using the IcedTea-Web plug-in to crash or, possibly, execute arbitrary code. The updated packages have been upgraded to the 1.1.7 version which is not affected by this issue.
-
7:10
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-171 - A buffer overflow flaw was found in the IcedTea-Web plug-in. Visiting a malicious web page could cause a web browser using the IcedTea-Web plug-in to crash or, possibly, execute arbitrary code. The updated packages have been upgraded to the 1.1.7 version which is not affected by this issue.
-
7:10
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-171 - A buffer overflow flaw was found in the IcedTea-Web plug-in. Visiting a malicious web page could cause a web browser using the IcedTea-Web plug-in to crash or, possibly, execute arbitrary code. The updated packages have been upgraded to the 1.1.7 version which is not affected by this issue.
-
-
11:20
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201211-1 - Multiple vulnerabilities have been found in MantisBT, the worst of which allowing for local file inclusion. Versions less than 1.2.11 are affected.
-
11:20
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201211-1 - Multiple vulnerabilities have been found in MantisBT, the worst of which allowing for local file inclusion. Versions less than 1.2.11 are affected.
-
11:20
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201211-1 - Multiple vulnerabilities have been found in MantisBT, the worst of which allowing for local file inclusion. Versions less than 1.2.11 are affected.
-
16:00
»
SecuriTeam
The Linux kernel is prone to a local information-disclosure vulnerability.
-
-
18:22
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1426-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the Linux kernel's memory management subsystem in the way quota handling for huge pages was performed. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. A use-after-free flaw was found in the madvise() system call implementation in the Linux kernel. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges.
-
18:22
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1426-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the Linux kernel's memory management subsystem in the way quota handling for huge pages was performed. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. A use-after-free flaw was found in the madvise() system call implementation in the Linux kernel. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges.
-
18:22
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1426-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the Linux kernel's memory management subsystem in the way quota handling for huge pages was performed. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. A use-after-free flaw was found in the madvise() system call implementation in the Linux kernel. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges.
-
-
20:34
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-169 - Multiple security issues were identified and fixed in OpenJDK (icedtea6). The fixes include, but are not limited to the TLS implementation changed to better adhere to the RFC, ScriptEngine permissions corrected, a conditional usage check being fixed, and many other fixes. The updated packages provide icedtea6-1.11.5 which is not vulnerable to these issues.
-
20:34
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-169 - Multiple security issues were identified and fixed in OpenJDK (icedtea6). The fixes include, but are not limited to the TLS implementation changed to better adhere to the RFC, ScriptEngine permissions corrected, a conditional usage check being fixed, and many other fixes. The updated packages provide icedtea6-1.11.5 which is not vulnerable to these issues.
-
20:34
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-169 - Multiple security issues were identified and fixed in OpenJDK (icedtea6). The fixes include, but are not limited to the TLS implementation changed to better adhere to the RFC, ScriptEngine permissions corrected, a conditional usage check being fixed, and many other fixes. The updated packages provide icedtea6-1.11.5 which is not vulnerable to these issues.
-
17:00
»
SecuriTeam
The Linux kernel is prone to a local information-disclosure vulnerability.
-
8:31
»
Hack a Day
So IT has your computer locked down, but if you’re lucky enough to have this model of telephone you can still play video games while at work. [AUTUIN] was at the thrift store and for just $8 he picked up an ACN videophone on which he’s now playing video games. We don’t know what magical [...]
-
-
22:38
»
SecDocs
Authors:
Carsten Grohmann Tom Vogt Tags:
Linux Event:
Chaos Communication Camp 2003 Abstract: SELinux is a modification of the Linux kernel and some userspace tools that adds Mandatory Access Controls and Role-Based Access Controls to the Linux system. We will be holding a 3-part SELinux introduction. This will consist of: a) Short overview and background for basic understanding b) Installation (participants should bring their own systems, they can be reinstalled from scratch or updated) c) Workshop to get the installed system up and running, installing additional software, reconfiguring the security policy, etc. We expect the whole session to fit into a 120 minute slot, though the workshop might extend beyond that, if interest is high. We will also try to bring an SELinux "play machine" where interested people can take a look at a running system and try to take it apart.
-
17:00
»
SecuriTeam
The Linux kernel is prone to a remote denial-of-service vulnerability.
-
17:00
»
SecuriTeam
The Linux kernel is prone to a denial-of-service vulnerability that affects the key management component.
-
17:00
»
SecuriTeam
The Linux kernel is prone to a local privilege-escalation vulnerability.
-
-
9:34
»
SecDocs
Authors:
Andy Green Michael Steil Milosch Meriac Tags:
games Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Microsoft went to some lengths to ensure that only approved code could be run on their 'Microsoft-only' PC, the Xbox. The talk gives an overview of the Xbox hardware components, and a detailed background into the Xbox 'security' architecture of the Xbox, and how the chain of trust was defeated using custom hardware. Also covered in detail is Microsoft's recent changes to the boot crypto using Palladium-style hash methods, and how this was broken by our team. We will also talk briefly about TCPA/Palladium, the implications and its possible future as well as the process of porting Linux.
-
9:28
»
SecDocs
Authors:
Andy Green Michael Steil Milosch Meriac Tags:
games Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Microsoft went to some lengths to ensure that only approved code could be run on their 'Microsoft-only' PC, the Xbox. The talk gives an overview of the Xbox hardware components, and a detailed background into the Xbox 'security' architecture of the Xbox, and how the chain of trust was defeated using custom hardware. Also covered in detail is Microsoft's recent changes to the boot crypto using Palladium-style hash methods, and how this was broken by our team. We will also talk briefly about TCPA/Palladium, the implications and its possible future as well as the process of porting Linux.
-
-
18:32
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201210-7 - Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Versions less than 22.0.1229.94 are affected.
-
18:32
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201210-7 - Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Versions less than 22.0.1229.94 are affected.
-
18:32
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201210-7 - Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Versions less than 22.0.1229.94 are affected.
-
-
18:16
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201210-6 - Multiple vulnerabilities have been found in Libav, allowing attackers to execute arbitrary code or cause Denial of Service. Versions less than 0.8.3 are affected.
-
18:16
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201210-6 - Multiple vulnerabilities have been found in Libav, allowing attackers to execute arbitrary code or cause Denial of Service. Versions less than 0.8.3 are affected.
-
18:16
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201210-6 - Multiple vulnerabilities have been found in Libav, allowing attackers to execute arbitrary code or cause Denial of Service. Versions less than 0.8.3 are affected.
-
18:16
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201210-5 - Two vulnerabilities have been found in Bash, the worst of which may allow execution of arbitrary code. Versions less than 4.2_p37 are affected.
-
18:16
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201210-5 - Two vulnerabilities have been found in Bash, the worst of which may allow execution of arbitrary code. Versions less than 4.2_p37 are affected.
-
18:16
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201210-5 - Two vulnerabilities have been found in Bash, the worst of which may allow execution of arbitrary code. Versions less than 4.2_p37 are affected.
-
-
15:04
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201210-1 - An error in the hostname matching of w3m might enable remote attackers to conduct man-in-the-middle attacks. Versions less than 0.5.2-r4 are affected.
-
15:04
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201210-1 - An error in the hostname matching of w3m might enable remote attackers to conduct man-in-the-middle attacks. Versions less than 0.5.2-r4 are affected.
-
15:04
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201210-1 - An error in the hostname matching of w3m might enable remote attackers to conduct man-in-the-middle attacks. Versions less than 0.5.2-r4 are affected.
-
15:04
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201210-2 - Multiple vulnerabilities have been found in MoinMoin, the worst of which allowing for injection of arbitrary web script or HTML. Versions less than 1.9.4 are affected.
-
15:04
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201210-2 - Multiple vulnerabilities have been found in MoinMoin, the worst of which allowing for injection of arbitrary web script or HTML. Versions less than 1.9.4 are affected.
-
15:04
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201210-2 - Multiple vulnerabilities have been found in MoinMoin, the worst of which allowing for injection of arbitrary web script or HTML. Versions less than 1.9.4 are affected.
-
15:03
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201210-4 - Multiple vulnerabilities were found in qemu-kvm, allowing attackers to execute arbitrary code. Versions less than 1.1.1-r1 are affected.
-
15:03
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201210-4 - Multiple vulnerabilities were found in qemu-kvm, allowing attackers to execute arbitrary code. Versions less than 1.1.1-r1 are affected.
-
15:03
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201210-4 - Multiple vulnerabilities were found in qemu-kvm, allowing attackers to execute arbitrary code. Versions less than 1.1.1-r1 are affected.
-
15:03
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201210-3 - A vulnerability which allows a remote attacking server to read or overwrite arbitrary files has been found in rdesktop. Versions less than 1.7.0 are affected.
-
15:03
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201210-3 - A vulnerability which allows a remote attacking server to read or overwrite arbitrary files has been found in rdesktop. Versions less than 1.7.0 are affected.
-
15:03
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201210-3 - A vulnerability which allows a remote attacking server to read or overwrite arbitrary files has been found in rdesktop. Versions less than 1.7.0 are affected.
-
-
12:22
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-167 - Mozilla security researcher moz_bug_r_a4 reported a regression where security wrappers are unwrapped without doing a security check in defaultValue(). This can allow for improper access access to the Location object. In versions 15 and earlier of affected products, there was also the potential for arbitrary code execution. The mozilla firefox packages has been upgraded to the latest version which is unaffected by this security flaw.
-
12:22
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-167 - Mozilla security researcher moz_bug_r_a4 reported a regression where security wrappers are unwrapped without doing a security check in defaultValue(). This can allow for improper access access to the Location object. In versions 15 and earlier of affected products, there was also the potential for arbitrary code execution. The mozilla firefox packages has been upgraded to the latest version which is unaffected by this security flaw.
-
12:22
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-167 - Mozilla security researcher moz_bug_r_a4 reported a regression where security wrappers are unwrapped without doing a security check in defaultValue(). This can allow for improper access access to the Location object. In versions 15 and earlier of affected products, there was also the potential for arbitrary code execution. The mozilla firefox packages has been upgraded to the latest version which is unaffected by this security flaw.
-
-
16:58
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-166 - The dump_resource function in dird/dird_conf.c in Bacula before 5.2.11 does not properly enforce ACL rules, which allows remote authenticated users to obtain resource dump information via unspecified vectors. The updated packages have been patched to correct this issue.
-
16:58
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-166 - The dump_resource function in dird/dird_conf.c in Bacula before 5.2.11 does not properly enforce ACL rules, which allows remote authenticated users to obtain resource dump information via unspecified vectors. The updated packages have been patched to correct this issue.
-
16:58
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-166 - The dump_resource function in dird/dird_conf.c in Bacula before 5.2.11 does not properly enforce ACL rules, which allows remote authenticated users to obtain resource dump information via unspecified vectors. The updated packages have been patched to correct this issue.
-
16:50
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-165 - The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service via a crafted PNG file that triggers incorrect memory allocation. The updated packages have been patched to correct this issue.
-
16:50
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2012-165 - The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service via a crafted PNG file that triggers incorrect memory allocation. The updated packages have been patched to correct this issue.
-
16:50
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-165 - The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service via a crafted PNG file that triggers incorrect memory allocation. The updated packages have been patched to correct this issue.
-
-
8:05
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2012-163 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and it is presumed that with enough effort at least some of these could be exploited to run arbitrary code. Various other issues have been addressed. The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws.
-
8:05
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2012-163 - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and it is presumed that with enough effort at least some of these could be exploited to run arbitrary code. Various other issues have been addressed. The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws.
-
-
23:52
»
Packet Storm Security Exploits
Linux kernel binfmt_script handling in combination with CONFIG_MODULES can lead to disclosure of kernel stack data during execve via copy of data from dangling pointer to stack to growing argv list. Apart from that, the BINPRM_MAX_RECURSION can be exceeded: the maximum of 4 recursions is ignored, instead a maximum of roughly 2^6 recursions is in place. Proof of concept included.
-
23:52
»
Packet Storm Security Recent Files
Linux kernel binfmt_script handling in combination with CONFIG_MODULES can lead to disclosure of kernel stack data during execve via copy of data from dangling pointer to stack to growing argv list. Apart from that, the BINPRM_MAX_RECURSION can be exceeded: the maximum of 4 recursions is ignored, instead a maximum of roughly 2^6 recursions is in place. Proof of concept included.
Skip to page:
1
2
3
...
15