iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file.
Monthly Archives: February 2016
WebKitGTK+ Code Execution / Denial Of Service
WebKitGTK+ versions prior to 2.10.5 suffer from arbitrary code execution and denial of service vulnerabilities.
A Tale of openssl_seal(), PHP, and Apache2handle
openssl_seal() is prone to use uninitialized memory that can be turned into a code execution. This document describes technical details of the journey to hijack apache2 requests. It is a very well written and thoroughly documented piece of research.
eBay Refuses To Fix Flaw Exposing Users To Malware And Phishing Attacks
GCHQ's Xmas Puzzle Proves Uncrackable
Security Flaws Found In Smart Tech
Silk Road Investigator Re-Arrested Trying To Flee US
Ubuntu Security Notice USN-2890-1
Ubuntu Security Notice 2890-1 – It was discovered that a use-after-free vulnerability existed in the AF_UNIX implementation in the Linux kernel. A local attacker could use crafted epoll_ctl calls to cause a denial of service (system crash) or expose sensitive information. It was discovered that the KVM implementation in the Linux kernel did not properly restore the values of the Programmable Interrupt Timer (PIT). A user-assisted attacker in a KVM guest could cause a denial of service in the host (system crash). Various other issues were also addressed.
Ubuntu Security Notice USN-2890-2
Ubuntu Security Notice 2890-2 – It was discovered that a use-after-free vulnerability existed in the AF_UNIX implementation in the Linux kernel. A local attacker could use crafted epoll_ctl calls to cause a denial of service (system crash) or expose sensitive information. It was discovered that the KVM implementation in the Linux kernel did not properly restore the values of the Programmable Interrupt Timer (PIT). A user-assisted attacker in a KVM guest could cause a denial of service in the host (system crash). Various other issues were also addressed.
Red Hat Security Advisory 2016-0098-01
Red Hat Security Advisory 2016-0098-01 – IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.