Security Patches and FUD/Drama

-
Security updates for Tuesday
Security updates have been issued by Debian (python-psutil, slurm-llnl, symfony, and thunderbird), Fedora (gd and ghostscript), and SUSE (ceph, haproxy, java-11-openjdk, and ncurses).
-
NextCry Ransomware Goes After Linux Servers [Ed: This exploits already-compromised (unpatched) servers]
-
Coin Stealer Found in Monero Linux Binaries From Official Site [Ed: The news isn't about Linux but about a compromised site.]
-
- Login or register to post comments
Printer-friendly version
- 3672 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Android Document Scanning and Developer-Focused TV Box
| Improving the security model of the LVFS
There are lots of layers of security in the LVFS and fwupd design, including restricted account modes, 2FA, and server side AppStream namespaces. The most powerful one is the so-called vendor-id that the vendors cannot assign themselves, and is assigned by me when creating the vendor account on the LVFS. The way this works is that all firmware from the vendor is tagged with a vendor-id string like USB:0x056A which in this case matches the USB consortium vendor assigned ID. Client side, the vendor-id from the signed metadata is checked against the physical device and the firmware is updated only if the ID matches. This ensures that malicious or careless users on the LVFS can never ship firmware updates for other vendors hardware. About 90% of the vendors on the LVFS are locked down with this mechanism.
Some vendors have to have IDs that they don’t actually own, a good example here is for a DFU device like the 8bitdo controllers. In runtime mode they use the USB-assigned 8bitdo VID, but in bootloader mode they use a generic VID which is assigned to the chip supplier as they are using the reference bootloader. This is obviously fine, and both vendor IDs are assigned to 8bitdo on the LVFS for this reason. Another example is where Lenovo is responsible for updating Lenovo-specific NVMe firmware, but where the NVMe vendor isn’t always Lenovo’s PCI ID.
|
Programming: Vim, Qt Shader and Python
| Games: Pygame, The Long Dark, DXVK and Shovel Knight
|
This is a Web site issue
Official Monero website compromised with malware that steals funds
New ACBackdoor Malware Targeting Both Linux and Windows Systems
New ACBackdoor Malware Targeting Both Linux and Windows Systems [Ed: This relies on a system already being compromised]
By HackRead
Meet ACbackdoor malware targeting Linux and Windows devices [Ed: They call it "backdoor" but it targets machines that are already compromised some other way]
ZDNet: Linux is terrorism
US student was allegedly building a custom Gentoo Linux distro for ISIS [Ed: ZDNet -- the CBS tabloid -- now associating "Linux" with terrorism. And it was composed by their biggest troll, Catalin Cimpanu. Fact: most terrorists use Microsoft Windows. Shall we deduce Windows is the "operating system of terrorists"?]
ZDNet meme
More scare-mongering
Servers Running Linux May Get Riskier for Enterprises Next Year [Ed: GNU/Linux FUD to increase next year. Or this year. Say people who sell security as a product]
ACBbackdoor trojan designed to hit Linux...
ACBbackdoor trojan designed to hit Linux and Windows systems
More FUD and More anti-Linux
Chinese Hackers Break Into Chrome, Safari, Edge; Reveal Browsers' Vulnerabilities
New Roboto botnet emerges targeting Linux servers running Webmin [Ed: ZDNet again goes out of its way to ignore back doors in #proprietarysoftware such as Windows and instead promote the stigma of "Linux" having "back doors" and being super dangerous, courtesy of By Catalin Cimpanu as usual]
Webmin
Linux Webmin Servers Being Attacked by New P2P Roboto Botnet [Ed: Catalin Cimpanu's 'homebase' with more from the same 'script']
Again trying to associate "Linux" with "ISIS"
Guy Arrested For Creating ‘Custom’ Linux Distro For ISIS
Chrome, Edge, and Safari are not as safe as you might think
Your web browsers including Chrome, Edge, and Safari are not as safe as you might think
More from the same 'script'
The awaiting Roboto Botnet
Linux Servers Running Webmin App Targeted By DDoS Attacks
Slashdot joins the drama a week late
extCloud Linux Servers Targetted by NextCry Ransomware
NextCry Ransomware Targets NextCloud Linux Servers and Remains Undetected Features
NextCloud Linux Servers Targetted by NextCry Ransomware
NextCloud Linux Servers Targetted by NextCry Ransomware