Linux

How To Patch and Protect Linux Kernel Stack Clash Vulnerability CVE-2017-1000364

https://www.cyberciti.biz/faq/howto-patch-linux-kernel-stack-clash-vulnerability-cve-2017-1000364/ A very serious security problem has been found in the Linux kernel called “The Stack Clash.” The Qualys Research Labs discovered various problems in the dynamic linker of the GNU C Library (CVE-2017-1000366) which allow local privilege escalation by clashing the stack including Linux kernel. This bug affects Linux, OpenBSD, NetBSD, FreeBSD and Solaris,

A 20-Year-Old Linux Kernel Bug

http://robert.ocallahan.org/2017/06/how-i-found-20-year-old-linux-kernel-bug.html?m=1 This class of bugs — “small overrunning read that doesn’t get used”  – was found on some wireless ioctl system calls. The bug was apparently introduced in Linux 2.1.15, released December 12, 1996. It’s interesting that it wasn’t found and fixed until now. I guess not many programs use these ioctls, and those that

The fun and semi-useless toys of Linux

https://opensource.com/life/16/6/fun-and-semi-useless-toys-linux?sc_cid=7016000000127ECAAY There are several minor tools and applications out there that keep popping up in my toolkit. You might not call any of them “killer apps,” but darn it, they’re fun to play around with and they sometimes take you in interesting directions. This collection has computer art, image manipulation, fractals and music.

5 totally inappropriate ways to exit Vim

https://opensource.com/article/17/6/5-totally-incorrect-ways-exit-vim?sc_cid=7016000000127ECAAY Vim can be a challenge to learn. But for many first-time users, just exiting the program can be a problem. This article gives solutions to this serious problem that many Linux/Unix users face every day.

​How to use Linux’s built-in USB attack protection | ZDNet

http://www.zdnet.com/article/how-to-use-linuxs-built-in-usb-attack-protection/ USB is insecure. There are USB sticks that will destroy your computer, USB sticks loaded with spyware, and even official enterprise USB sticks infected with malware. Windows and Macs are easy to crack with USB-borne tools. There are devices like the USG USB stick firewall, which can protect you. Linux users can stop attackers armed with USB sticks with USBGuard software.

An introduction to parameter expansion in Bash

https://opensource.com/article/17/6/bash-parameter-expansion?sc_cid=7016000000127ECAAY In Bash, entities that store values are known as parameters.  The wealth of parameter expansion modifiers transforms Bash variables and other parameters into powerful tools beyond simple value stores.

How To Use Bash Parameter Substitution

https://www.cyberciti.biz/tips/bash-shell-parameter-substitution-2.html The $ character is used for parameter expansion, arithmetic expansion and command substitution. You can use it for manipulating and expanding variables on demands without using external commands such as perl, python, sed or awk. This guide shows you how to use parameter expansion modifiers.

The top 7 Linux IoT projects | Network World

http://www.networkworld.com/article/3200272/internet-of-things/the-top-7-linux-iot-projects.html It’s a Linux world, and the rest of computing is just living in it. IoT is no exception. The Linux Foundation lists these seven projects as the key players in the march of connected open-source systems. This article is a quick rundown on them.

Now You Can Run Linux On Windows 10 Without Enabling Developer Mode

https://fossbytes.com/linux-on-windows-10-without-developer-mode/ With the release of Windows 10 Insider Build 16215, Microsoft has announced that now users don’t need to activate Developer Mode to run Linux on Windows 10. Now, Microsoft thinks that WSL is stable enough to remove this restriction. However, this change still keeps Linux an optional component and the users manually need to

How to prevent unprivileged users from viewing dmesg command output on Linux – nixCraft

https://www.cyberciti.biz/faq/how-to-prevent-unprivileged-users-from-viewing-dmesg-command-output-on-linux/ One can use dmesg command see or control the kernel ring buffer.  The kernel syslog contains debugging information that is often useful during exploitation of other vulnerabilities, such as kernel heap addresses.  There is an option that prevents unprivileged users from reading the syslog. sudo sysctl -w kernel.dmesg_restrict=1