LWN.net's Journal
[Most Recent Entries]
[Calendar View]
Thursday, August 22nd, 2019
Time |
Event |
12:30a |
[$] LWN.net Weekly Edition for August 22, 2019 The LWN.net Weekly Edition for August 22, 2019 is available. | 12:59p |
Security updates for Thursday Security updates have been issued by Fedora (nginx), openSUSE (ImageMagick and putty), Red Hat (Ansible, atomic-openshift-web-console, ceph, and qemu-kvm-rhev), SUSE (kvm, libssh2_org, postgresql96, qemu, and wavpack), and Ubuntu (libzstd and openjpeg2). | 1:08p |
Backdoor code found in 11 Ruby libraries (ZDNet) ZDNet reportson the discovery of a set of malicious libraries in the RubyGems repository. " The individual behind this scheme was active for more than a month, and their actions were not detected.
Things changed when the hacker managed to gain access to the RubyGems account of one of the rest-client developers, which he used to push four malicious versions of rest-client on RubyGems.
However, by targeting such a high-profile project that has over 113 million total downloads on RubyGems, the hacker also brought a lot of light to their operation, which was taken down within a few hours after users first spotted the malicious code in the rest-client library." | 1:14p |
Backdoors in Webmin Anybody using Webmin, a web-based system-administration tool, will want to update now, as it turns out that the system has been backdoored for over a year. " At some time in April 2018, the Webmin development build server was exploited and a vulnerability added to the password_change.cgi script. Because the timestamp on the file was set back, it did not show up in any Git diffs. This was included in the Webmin 1.890 release." | 7:24p |
[$] Restricting path name lookup with openat2() Looking up a file given a path name seems like a straightforward task, but it turns out to be one of the more complex things the kernel does. Things get more complicated if one is trying to write robust (user-space) code that can do the right thing with paths that are controlled by a potentially hostile user. Attempts to make the open() and openat() system calls safer date back at least to an attempt to add O_BENEATH in 2014, but numerous problems remain. Aleksa Sarai, who has been working in this area for a while, has now concluded that a new version of openat(), naturally called openat2(), is required to truly solve this problem. |
|