Skip to main content

Questions tagged [linux]

Securing Linux systems and applications; understanding Linux security features.

0 votes
0 answers
17 views

I want to know how much secure is the package lm-sensors. I need to monitor the temperature of my machine to adapt the configuration of the fans. The programm prompt me for my root password to access ...
Yohan W. Dunon's user avatar
0 votes
1 answer
142 views

I would like to be able to store backups on potentially "untrustworthy" sources such as cloud storage. Whilst I could probably get away with a simple encrypted tar file, for a single backup, ...
Sam Coutteau's user avatar
0 votes
0 answers
39 views

I'm running a few services for different teams in my organization including a Wordpress site. Today a teamlead messaged me, that none of them is able to log into their accounts anymore. While ...
andii1997's user avatar
  • 101
0 votes
2 answers
64 views

Standard scripting utilities such as sed, tr, grep, cat (etc.) can process a stream via standard in and transform it according to some arguments, outputting to STDOUT. I wonder if there are any attack ...
bitmask's user avatar
  • 657
1 vote
0 answers
50 views

We are currently going through an assessment for CyberEssentials Plus. The assessor wants us to install the Qualys Cloud Agent on our servers (which are all Linux). This in itself feels like a massive ...
SystemParadox's user avatar
2 votes
1 answer
154 views

I need a process to communicate with a child. No other process should be able to listen in on the communication. So far, I am using socketpair() to create two file descriptors and pass one to the ...
tobib's user avatar
  • 173
1 vote
0 answers
120 views

I am trying to add some security to my desktop LUbuntu system by setting up clamav to scan user files on access. I followed its recommendation not to run as root, but to run it as a clamav user, and ...
Paul Lynch's user avatar
1 vote
2 answers
172 views

For context, my question relates to the use of the systemd-cryptenroll and the related TPM enrollment options where one set of options "configures a TPM2 signed PCR policy to bind encryption to.&...
Hari's user avatar
  • 109
1 vote
1 answer
141 views

Seems a lot of privileged escalation involves replacing libc or another dependency of a setuid binary like "sudo" with something an attacker controls. To ensure this, a wide range of file ...
mousetail's user avatar
2 votes
0 answers
95 views

This is a follow-up question to: How to check if a PCI device is trusted or untrusted by the Linux kernel (for IOMMU)? On Linux, is there a way to determine, from the command line, as root if ...
laomaiweng's user avatar
2 votes
1 answer
76 views

Can strtok()'s static buffer enable cross-container attacks in Kubernetes when containers share libc through copy-on-write? In Kubernetes, containers running on the same node often share memory pages ...
Łukasz D. Tulikowski's user avatar
1 vote
0 answers
89 views

I would like to check the possilbity about encrypt passowrd of authz users that we configured in svnserve.cfg I have installed SVN in REHL9.4. Configure password at SVN/.../respository-name/config/ ...
Butthry's user avatar
  • 11
10 votes
3 answers
3k views

A number of Linux distros, for quite a while now, by default install no root passwords and always require sudo from another user to become root. Examples are Ubuntu and AWS. This is implemented with ...
Kevin Keane's user avatar
  • 1,201
-1 votes
1 answer
157 views

I just run an rkhunter -c --rwo and get : Warning: Suspicious file types found in /dev: /dev/shm/jack_db-1000/metadata.db: Berkeley DB (Hash, version 9, native byte-order) /dev/shm/...
fauve's user avatar
  • 139
0 votes
2 answers
198 views

This Reddit comment suggests that even if malicious software gains root access, SecureBoot + Lockdown mode in the Linux kernel can help prevent malware from gaining access to the kernel to perform ...
zstewart's user avatar
  • 131

15 30 50 per page
1
2 3 4 5
146