On Saturday the Debian Project announced the release of Debian 9 "Stretch". This means that Jessie will be oldstable and Wheezy won't recieve any updates anymore. So it's time to dist-upgrade.
In kernel-programming we should avoid doing call_usermodehelper() which allows to execute a command from kernel-space. And sometimes we even want to call this function within a systemcall. Normally, we really don't wanna do this. But, desperate times require extraordinary methods.
When I first tried to execute call_usermodehelper() within a systemcall() I got a kernel failure. So I googled and what I found was:
Eric Dumazet of Google found a very dangerous remote execution bug in the Linux Kernel. It's located in the recv-syscall with the MSG_PEEK-flag set. Attackers can remotely execute code on the target..
I used a google-dork to find vulnerable software:
And found some possible targets:
The latest wikileaks revealings gave also insights about an interesting bug in cisco products. No I am not talking about the bug in the Cisco Cluster Management Protocol (CMP). I am talking about the open telnet ports.Ten years ago it was already recommended to use ssh instead and there are still so many devices out t
During my research about update mechanisms of open-source software I discovered vulnerabilities in OpenElec.