Questions tagged [linux]
Securing Linux systems and applications; understanding Linux security features.
2,179 questions
0 votes
0 answers
17 views
How secure is the package lm-sensors? [closed]
I want to know how much secure is the package lm-sensors. I need to monitor the temperature of my machine to adapt the configuration of the fans. The programm prompt me for my root password to access ...
0 votes
1 answer
142 views
File backup encryption for personal files
I would like to be able to store backups on potentially "untrustworthy" sources such as cloud storage. Whilst I could probably get away with a simple encrypted tar file, for a single backup, ...
0 votes
0 answers
39 views
Wordpress site compromised? [closed]
I'm running a few services for different teams in my organization including a Wordpress site. Today a teamlead messaged me, that none of them is able to log into their accounts anymore. While ...
0 votes
2 answers
64 views
Are the stream editing coreutils secure against malicious standard in?
Standard scripting utilities such as sed, tr, grep, cat (etc.) can process a stream via standard in and transform it according to some arguments, outputting to STDOUT. I wonder if there are any attack ...
1 vote
0 answers
50 views
Security risks of endpoint agents [closed]
We are currently going through an assessment for CyberEssentials Plus. The assessor wants us to install the Qualys Cloud Agent on our servers (which are all Linux). This in itself feels like a massive ...
2 votes
1 answer
154 views
Can /proc/PID/fd be used to snoop on anonymous sockets?
I need a process to communicate with a child. No other process should be able to listen in on the communication. So far, I am using socketpair() to create two file descriptors and pass one to the ...
1 vote
0 answers
120 views
Run clamav as root for a desktop system?
I am trying to add some security to my desktop LUbuntu system by setting up clamav to scan user files on access. I followed its recommendation not to run as root, but to run it as a clamav user, and ...
1 vote
2 answers
172 views
Does a signed TPM2 PCR policy verify the EFI code similarly to secure boot?
For context, my question relates to the use of the systemd-cryptenroll and the related TPM enrollment options where one set of options "configures a TPM2 signed PCR policy to bind encryption to.&...
1 vote
1 answer
141 views
Is static linking setuid libraries musl libc an effective defense against chroot/mount attacks?
Seems a lot of privileged escalation involves replacing libc or another dependency of a setuid binary like "sudo" with something an attacker controls. To ensure this, a wide range of file ...
2 votes
0 answers
95 views
How to check whether a PCI device is trusted or not on Linux?
This is a follow-up question to: How to check if a PCI device is trusted or untrusted by the Linux kernel (for IOMMU)? On Linux, is there a way to determine, from the command line, as root if ...
2 votes
1 answer
76 views
Can strtok()'s static buffer enable cross-container attacks in Kubernetes when containers share libc through copy-on-write?
Can strtok()'s static buffer enable cross-container attacks in Kubernetes when containers share libc through copy-on-write? In Kubernetes, containers running on the same node often share memory pages ...
1 vote
0 answers
89 views
How can we encrypt password in svnserve.cfg?
I would like to check the possilbity about encrypt passowrd of authz users that we configured in svnserve.cfg I have installed SVN in REHL9.4. Configure password at SVN/.../respository-name/config/ ...
10 votes
3 answers
3k views
Linux root account without password - what are the issues, and how to address them?
A number of Linux distros, for quite a while now, by default install no root passwords and always require sudo from another user to become root. Examples are Ubuntu and AWS. This is implemented with ...
-1 votes
1 answer
157 views
Is it safe to have /dev/shm/jack_db-100/* files? [closed]
I just run an rkhunter -c --rwo and get : Warning: Suspicious file types found in /dev: /dev/shm/jack_db-1000/metadata.db: Berkeley DB (Hash, version 9, native byte-order) /dev/shm/...
0 votes
2 answers
198 views
Does SecureBoot+Lockdown help protect against getting firmware-level malware, even if an attacker gains Root access?
This Reddit comment suggests that even if malicious software gains root access, SecureBoot + Lockdown mode in the Linux kernel can help prevent malware from gaining access to the kernel to perform ...