ux

Container Escape Hack Targets Vulnerable Linux Kernel




ux

Linux Variant Of Winnti Malware Spotted In Wild





ux

Linux Command-Line Editors Vulnerable To High Severity Bug









ux

Hackers Have Been Quietly Targeting Linux Servers




ux

Mandriva Linux Security Advisory 2015-208

Mandriva Linux Security Advisory 2015-208 - An issue has been identified in Mandriva Business Server 2's setup package where the /etc/shadow and /etc/gshadow files containing password hashes were created with incorrect permissions, making them world-readable. This update fixes this issue by enforcing that those files are owned by the root user and shadow group, and are only readable by those two entities. Note that this issue only affected new Mandriva Business Server 2 installations. Systems that were updated from previous Mandriva versions were not affected. This update was already issued as MDVSA-2015:184, but the latter was withdrawn as it generated.rpmnew files for critical configuration files, and rpmdrake might propose the user to use those basically empty files, thus leading to loss of passwords or partition table. This new update ensures that such.rpmnew files are not kept after the update.




ux

Mandriva Linux Security Advisory 2015-209

Mandriva Linux Security Advisory 2015-209 - Update PHP packages address buffer over-read and overflow vulnerabilities. PHP has been updated to version 5.5.24, which fixes these issues and other bugs. Additionally the timezonedb packages has been upgraded to the latest version and the PECL packages which requires so has been rebuilt for php-5.5.24.




ux

Mandriva Linux Security Advisory 2015-210

Mandriva Linux Security Advisory 2015-210 - A denial of service flaw was found in the way QEMU handled malformed Physical Region Descriptor Table data sent to the host's IDE and/or AHCI controller emulation. A privileged guest user could use this flaw to crash the system. It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU.




ux

Mandriva Linux Security Advisory 2015-211

Mandriva Linux Security Advisory 2015-211 - glusterfs was vulnerable to a fragment header infinite loop denial of service attack. Also, the glusterfsd SysV init script was failing to properly start the service. This was fixed by replacing it with systemd unit files for the service that work properly.




ux

Mandriva Linux Security Advisory 2015-212

Mandriva Linux Security Advisory 2015-212 - An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures.




ux

Mandriva Linux Security Advisory 2015-213

Mandriva Linux Security Advisory 2015-213 - lftp incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site. lftp was affected by this issue as it uses code from cURL for checking SSL certificates. The curl package was fixed in MDVSA-2015:098.




ux

Mandriva Linux Security Advisory 2015-214

Mandriva Linux Security Advisory 2015-214 - The libksba package has been updated to version 1.3.3, which fixes an integer overflow in the DN decoder and a couple of other minor bugs.




ux

Mandriva Linux Security Advisory 2015-215

Mandriva Linux Security Advisory 2015-215 - The t1utils package has been updated to version 1.39, which fixes a buffer overrun, infinite loop, and stack overflow in t1disasm.




ux

Mandriva Linux Security Advisory 2015-216

Mandriva Linux Security Advisory 2015-216 - Lack of filtering in the title parameter of links to rrdPlugin allowed cross-site-scripting attacks against users of the web interface.




ux

Mandriva Linux Security Advisory 2015-217

Mandriva Linux Security Advisory 2015-217 - SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE at the end of a SELECT statement. The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK in a CREATE TABLE statement. The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. The updated packages provides a solution for these security issues.




ux

Mandriva Linux Security Advisory 2015-218

Mandriva Linux Security Advisory 2015-218 - Multiple vulnerabilities have been found and corrected in glibc. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. Various other issues were also addressed. The updated packages provides a solution for these security issues.




ux

Mandriva Linux Security Advisory 2015-220

Mandriva Linux Security Advisory 2015-220 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user.




ux

Mandriva Linux Security Advisory 2015-219

Mandriva Linux Security Advisory 2015-219 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When parsing HTTP cookies, if the parsed cookie's path element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user.




ux

Mandriva Linux Security Advisory 2015-221

Mandriva Linux Security Advisory 2015-221 - Multiple vulnerabilities have been found and corrected in clamav. The updated packages provides a solution for these security issues.




ux

Mandriva Linux Security Advisory 2015-222

Mandriva Linux Security Advisory 2015-222 - Emanuele Rocca discovered that ppp was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon.




ux

Mandriva Linux Security Advisory 2015-224

Mandriva Linux Security Advisory 2015-224 - Ruby OpenSSL hostname matching implementation violates RFC 6125. The ruby packages for MBS2 has been updated to version 2.0.0-p645, which fixes this issue.




ux

Mandriva Linux Security Advisory 2015-225

Mandriva Linux Security Advisory 2015-225 - The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password.




ux

Mandriva Linux Security Advisory 2015-226

Mandriva Linux Security Advisory 2015-226 - FCGI does not perform range checks for file descriptors before use of the FD_SET macro. This FD_SET macro could allow for more than 1024 total file descriptors to be monitored in the closing state. This may allow remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening many socket connections to the host and crashing the service.




ux

Mandriva Linux Security Advisory 2015-223

Mandriva Linux Security Advisory 2015-223 - Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB allow remote attackers to cause a denial of service and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow. The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB allows remote attackers to cause a denial of service and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.




ux

Mandriva Linux Security Advisory 2015-227

Mandriva Linux Security Advisory 2015-227 - This update provides MariaDB 5.5.43, which fixes several security issues and other bugs.




ux

Mandriva Linux Security Advisory 2015-228

Mandriva Linux Security Advisory 2015-228 - It was found that libuv does not call setgoups before calling setuid/setgid. This may potentially allow an attacker to gain elevated privileges. The libuv library is bundled with nodejs, and a fixed version of libuv is included with nodejs as of version 0.10.37. The nodejs package has been updated to version 0.10.38 to fix this issue, as well as several other bugs.




ux

Mandriva Linux Security Advisory 2015-229

Mandriva Linux Security Advisory 2015-229 - It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code.




ux

Mandriva Linux Security Advisory 2015-230

Mandriva Linux Security Advisory 2015-230 - Squid configured with client-first SSL-bump does not correctly validate X509 server certificate domain / hostname fields.




ux

Mandriva Linux Security Advisory 2015-231

Mandriva Linux Security Advisory 2015-231 - Tilmann Haak from xing.com discovered that XML::LibXML did not respect the expand_entities parameter to disable processing of external entities in some circumstances. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.




ux

Mandriva Linux Security Advisory 2015-232

Mandriva Linux Security Advisory 2015-232 - A malformed certificate input could cause a heap overflow read in the DER decoding functions of Libtasn1. The heap overflow happens in the function _asn1_extract_der_octet().





ux

Camry Hybrid vs. Sonata Hybrid, mobile charging, Cash for Clunkers redux: The Week in Reverse

Sales of which electric car plunged the steepest leading into the U.S. pandemic slowdown? Which automaker reaffirmed its commitment to hydrogen fuel cells? This is our look back at the Week In Reverse—right here at Green Car Reports—for the week ending May 8, 2020. Our biggest combination of stories this week related to the most...



  • The Week In Reverse

ux

2020 Luxembourg budget draft law: Tax rulings granted before 2015 are no longer valid!

In Brief: According to the 2020 budget draft law n°7500, published on 14 October 2019 (the “Bill”), the validity of advance tax agreements (“ATAs”) granted prior to 1 January 2015 should now be limited to five years. Sinc...




ux

Coronavirus - DTA Luxembourg and DTA Netherlands – Cross-border commuters (“Grenzpendler”) working in their home offices - Germany

German-Luxembourg cross-border commuters Luxembourg and Germany have concluded a mutual agreement (Verständigungsvereinbarung) for Covid 19 related home office activities (für Corona bedingte Home Office Tätigkeiten) on 3 April 2020,...




ux

Tirada dadka ugu dhintey Covid-19 Talyaaniga oo kor u dhaaftay soddon kun oo ruux.

Dalka Talyaaniga ayaa noqday wadankii ugu horeeyay ee ka tirsan Ururka Midowga Yurub oo diiwaangeliyay in cudurka Coronavirus ay ugu dhinteen dad gaaraya soddon kun oo ruux sida la xaqiijiyay, Maanta oo keli ah 243 ruux ayaa dhimashadooda, la diiwaangeliya geeriyootay dalka Talyaaniga. Maalin walba tirada cudurkan laga heli jirey dalka Talyaaniga ayaa hoos ugu […]

The post Tirada dadka ugu dhintey Covid-19 Talyaaniga oo kor u dhaaftay soddon kun oo ruux. appeared first on Horseed Media • Somali News.




ux

Alg�rie: Deux bombes de confection artisanale d�truites � Alger et Boumerdes

Alger -Deux bombes de confection artisanale ont �t�...




ux

E-commerce: can luxury brands prevent retailers selling via online marketplaces?

On 26 July 2017, the European Court of Justice (“ECJ”) published an opinion issued by Advocate General Nils Wahl (the “AG’s Opinion”) indicating that luxury brands may prevent retailers from selling via online marketpla...




ux

New Defensive Measures for Blacklisted Jurisdictions: What impact will Luxembourg’s recent announcement have on Cayman-domiciled funds?

On 30 March, the Luxembourg Government published a new draft law (the Draft Law) which looks set to increase the Luxembourg tax burden for transactions realised with enterprises based in jurisdictions on the EU’s list of “non-cooperative...




ux

Britain’s Prince Andrew sued over debt on US$22 million Swiss luxury chalet

Legal proceedings have been launched in Switzerland against Britain’s Prince Andrew and his ex-wife Sarah, a newspaper reported on Thursday, over money they were said to still owe on a luxury chalet.Queen Elizabeth’s second son and Sarah, who remain close despite their 1996 divorce, bought the plush holiday home in the Verbier ski resort in southwest Switzerland in 2014 for 22 million Swiss francs (US$21.7 million).The wooden chalet has seven bedrooms, an indoor swimming pool and a sauna, Le…




ux

Refugee children leave Greece to settle in Luxembourg

A group of 12 is the first of more than 1000 relocations being expedited amid concerns over the impact of coronavirus on vulnerable groups.




ux

Luxury Brands Prefer Heritage Homes over Five-Star Hotels

Heritage homes are fast becoming the favourite hunting grounds of luxury brands scouting for premium retailing space in India, where suitable high-end malls are too few and the sales potential at five-star hotels is still uncertain. When designer wear brand Kimaya Fashions searched for a store in Hyderabad, it settled on a 16,000-sq ft bungalow in the upscale Jubilee Hills, in a property with floor area nearly three times the size of its average outlets. French luxury brand Hermes also moved into a Victorian property in Mumbai’s Horniman Circle to retail its popular Birkin bags. “It’s not necessarily out of choice,” says Pradeep Hirani, managing director of Kimaya Fashions, “This […]




ux

Steep rentals, lack of quality retail real estate making it tough for luxury brands to expand business in India

MUMBAI/DELHI: Niche luxury brands like Italian suit maker Kiton and British shoemaker John Lobb have started bespoke made-to-order services in India, but they are in no hurry to open swanky stores in the country. Reason: inability to find a place on the right location at reasonable rates. “Rentals in India are as high as international markets, but the demand is not as much,” said Pratik Dalmia, founder of Mumbai-based Regalia Luxury, which has the rights to market and sell Kiton and John Lobb brands in India. Steep rentals and lack of quality retail real estate at strategic locations near high-income neighbourhoods are making it hard for luxury brands to expand […]




ux

HARMAN Opens Premium Showroom for High-End Luxury Audio in Ahmedabad

GUJARAT, INDIA – HARMAN (NYSE:HAR), the premier connected technologies company for automotive, consumer and enterprise markets, today opened an exclusive premium showroom for its high-end, Luxury Audio range of products in Ahmedabad, Gujarat. This is the company’s fifth luxury audio showroom* in India and offers the most advanced high-performance audio systems available in the country.