Language Selection

English French German Italian Portuguese Spanish

Security

Vulnerability in the GIMP image editing tool

Filed under
Security
GIMP

h-online.com: According to security services provide Secunia, a vulnerability in the free image editing tool GIMP (GNU Image Manipulation Program) can potentially be exploited to compromise a users system.

A strangely compromised Linux box

Filed under
Linux
Security

aplawrence.com: A customer reported that a Linux machine used for ssh access (to in turn give telnet access to an ancient SCO machine) was refusing logins. I asked him to try logging in as root at the console; he was unable to do so.

Another Protocol Bites The Dust

Filed under
Security

links.org: For the last 6 weeks or so, a bunch of us have been working on a really serious issue in SSL. In short, a man-in-the-middle can use SSL renegotiation to inject an arbitrary prefix into any SSL session, undetected by either end.

GNOME Keyring

Filed under
Software
Security

mdeslaur.blogspot: For the past week or so, people have been talking about a “security issue” in Seahorse. This sums up my opinion on the matter: This isn't a security issue, and there is no good way to fix it.

Bug in latest Linux gives untrusted users root access

Filed under
Linux
Security

theregister.co.uk: A software developer has uncovered a bug in most versions of Linux that could allow untrusted users to gain complete control over the open-source operating system.

GNOME Cleartext Passwords: Bug or Feature?

Filed under
Software
Security

ubuntu-user.com: The current discussion in the Ubuntu forums is about a possible security hole in GNOME, specifically about GNOME registered users having their passwords appear as cleartext on the keyring. Not a bug, say its defenders, but the security concept behind the GNOME keyring.

Gnome Lets Anyone See Your Keyring Passwords

Filed under
Software
Security

omgubuntu.co.uk: A security hole in Gnome allows anyone to see your keyring passwords without needing to enter so much as a password.

Vulnerabilities in several PDF applications

Filed under
Security

h-online.com: Security holes in numerous PDF applications allow attackers to infect systems with malware. Linux distributor Red Hat has already released new packages for these applications, and other distributors are likely to follow soon.

FreeBSD Local Root Escalation Vulnerability

Filed under
Security
BSD

darknet.org.uk: It’s been a long time since we’ve heard about a problem with FreeBSD, partially because the mass of people using it isn’t that large and secondly because BSD tends to be pretty secure as operating systems go.

Bug exposes eight years of Linux kernel

Filed under
Linux
Security

theregister.co.uk: Linux developers have issued a critical update for the open-source OS after researchers uncovered a vulnerability in its kernel that puts most versions built in the past eight years at risk of complete takeover.

Syndicate content

More in Tux Machines

Leftovers: Software

today's howtos

Leftovers: Gaming

Pro tip: Find tons of open-source Android software with F-Droid

If you're looking for truly open-source software for the Android platform, you don't have to do a ton of searching or check through licenses from within the Google Play Store. All you have to do is download a simple tool called F-Droid. With this tool, you can download and install apps (from quite a large listing) as easily as you can from the Google Play Store. You won't, however, find F-Droid in the Google Play Store. Instead, you have to download the .apk file and install it manually. Once it's installed, the rest is just a matter of searching for an app and tapping to install. Read more