Attacking UEFI Runtime Services and Linux
Attackers with physical access are able to attack the firmware on many fully patched computers with DMA – Direct Memory Access. Once code execution is gained in UEFI/EFI Runtime ServicesRead More →
Attackers with physical access are able to attack the firmware on many fully patched computers with DMA – Direct Memory Access. Once code execution is gained in UEFI/EFI Runtime ServicesRead More →
It’s time to patch your Linux servers and PCs again. The good news is developers are looking very closely at Linux’s core code for possible security holes. The bad newsRead More →
Donald Austin is the main suspect behind the kernel.org security breach that took place in the summer of 2011.Donald Ryan Austin, 27, of El Portal, Florida, was charged yesterday withRead More →
On June 1st, I reported an arbitrary recursion bug in the Linux kernel that can be triggered by a local user on Ubuntu if the system was installed with homeRead More →
Short Bytes: Symantec’s automated threat analysis system, Norton Safe Web, claims that Linux kernel’s website kernel.org contains 4 threats and shows a red flag to the users. Looking at Norton’sRead More →
This is kind of a big deal because the mess is in 14.04 LTS, expiry date 2019. Ubuntu has patched four Linux kernel vulnerabilities that allowed for arbitrary code execution andRead More →
Android re-installation ahoy to sink privilege elevation that opens avenue for rooting apps. Google has shipped an out-of-band patch for Android shuttering a bug that is under active exploitation to rootRead More →
Linus Torvalds says almost no-one ‘actually ever hit the problem’, or will code at Xmas. Linux Lord Linus Torvalds says the fourth release candidate of Linux 4.4 contained “a fairlyRead More →