calamares-2.4.4-5.fc24

A security update that fixes Calamares bug CAL-405:
https://calamares.io/bugs/browse/CAL-405

When installing with a LUKS-encrypted `/` partition, Calamares was always creating a keyfile to decode `/` and storing it in the initramfs. It did that even with an unencrypted separate `/boot` partition. As a result, the keyfile would be stored in cleartext on the `/boot` partition, and it was possible to unlock the `/` partition without ever entering a passphrase. This completely defeated the security of LUKS.

Please note that this only affects manual partitioning. The automatic partitioning never leaves `/boot` unencrypted (and it is, in fact, recommended to also always encrypt `/boot` when doing manual partitioning).

This update fixes the `dracutlukscfg` module to not add the keyfile to `install_items` in the `dracut` configuration (so that `dracut` will not include it onto the initramfs) if `/boot` is separate and unencrypted.

calamares-2.4.4-5.fc25

A security update that fixes Calamares bug CAL-405:
https://calamares.io/bugs/browse/CAL-405

When installing with a LUKS-encrypted `/` partition, Calamares was always creating a keyfile to decode `/` and storing it in the initramfs. It did that even with an unencrypted separate `/boot` partition. As a result, the keyfile would be stored in cleartext on the `/boot` partition, and it was possible to unlock the `/` partition without ever entering a passphrase. This completely defeated the security of LUKS.

Please note that this only affects manual partitioning. The automatic partitioning never leaves `/boot` unencrypted (and it is, in fact, recommended to also always encrypt `/boot` when doing manual partitioning).

This update fixes the `dracutlukscfg` module to not add the keyfile to `install_items` in the `dracut` configuration (so that `dracut` will not include it onto the initramfs) if `/boot` is separate and unencrypted.

Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones

Here’s some bad news for Android users again.

Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers.

According to a new report from security rating firm BitSight, the issue is due to a vulnerability in the insecure

Stored Cross-Site Scripting in WP Canvas – Shortcodes WordPress Plugin

Posted by Summer of Pwnage on Nov 19

————————————————————————
Stored Cross-Site Scripting in WP Canvas – Shortcodes WordPress Plugin
————————————————————————
Yorick Koster, July 2016

————————————————————————
Abstract
————————————————————————
A Cross-Site Scripting vulnerability was found in…

Cross-Site Scripting in Huge IT Portfolio Gallery WordPress Plugin

Posted by Summer of Pwnage on Nov 19

————————————————————————
Cross-Site Scripting in Huge IT Portfolio Gallery WordPress Plugin
————————————————————————
Antonis Manaras, July 2016

————————————————————————
Abstract
————————————————————————
A Cross-Site Scripting vulnerability was found in the…

Persistent Cross-Site Scripting in Instagram Feed plugin via CSRF

Posted by Summer of Pwnage on Nov 19

————————————————————————
Persistent Cross-Site Scripting in Instagram Feed plugin via CSRF
————————————————————————
Sipke Mellema, July 2016

————————————————————————
Abstract
————————————————————————
A persistent Cross-Site Scripting vulnerability was found…