Linux

Dirty COW (CVE-2016-5195)

http://dirtycow.ninja/ The vulnerability, a variety known as a race condition, was found in the way Linux memory handles a duplication technique called copy on write. Untrusted users can exploit it to gain highly privileged write-access rights to memory mappings that would normally be read-only.  

How to live patch Ubuntu Linux Kernel without rebooting the server

http://www.cyberciti.biz/faq/howto-live-patch-ubuntu-linux-server-kernel-without-rebooting/ Kernel live patching enables runtime correction of critical security issues in running kernel without rebooting. Ubuntu Linux version 16.04 LTS supports live patching for both enterprise and the Ubuntu community members. The Canonical Livepatch Service is an authenticated, encrypted, signed stream of livepatch kernel modules for Ubuntu servers, virtual machines and desktops.

Unsafe at any clock speed: Linux kernel security needs a rethink | Ars Technica

http://arstechnica.com/security/2016/09/linux-kernel-security-needs-fixing/ Report from Linux security summit. Many security practices on modern devices are stick 90′s practices. There are improvements Linux kernel planned… but how can we convince IoT gadget makers to do their part in security puzzle? Linux kernel is not the only part that needs rethinking.

OpenSSL will patch this week high severity vulnerability – Security Affairs

http://securityaffairs.co/wordpress/51448/security/openssl-high-severity-flaw.html You might need to spare some time to do the update. One of the flaws that affect the popular toolkit has a “high” severity. The Project plans to release OpenSSL versions 1.1.0a, 1.0.2i and 1.0.1u next Thursday September 22 . The OpenSSL Project has already issued three security patches this year that addressed a total of

Mirai DDoS Trojan Is the Next Big Threat to IoT Devices and Linux Servers

http://news.softpedia.com/news/mirai-ddos-trojan-is-the-next-big-threat-for-iot-devices-and-linux-servers-507964.shtml This nasty trojan is targeted against Linux IoT devices. Mirai is an evolution of an older trojan, also used for DDoS attacks, known under many names, such as Gafgyt, Lizkebab, BASHLITE, Bash0day, Bashdoor, and Torlus. Mirai’s mode of operation is largely the same as Gafgyt, targeting IoT devices running Busybox. The trojan also targets