Updated on 2022-12-29 CVE-2022-23093 Arch Cloud Labs have published a breakdown of CVE-2022-23093, a vulnerability in the FreeBSD ping utility. Overview: FreeBSD vulnerability The FreeBSD project has issued a rare security advisory, this time for a vulnerability in the ping utility (CVE-2022-23093). Probably not that bad, though. “The memory safety bugs described above can be …
Linux
Updated on 2022-12-31: Linux Kernel Vulnerability Researchers from the ZDI (Zero Day Initiative) have detected a critical use-after-free remote code execution vulnerability in Linux kernel ksmbd. The issue lies in the way SMB2_TREE_DISCONNECT commands are processed. Note In a pre-holiday “Grinch move”, ZDI released limited details on this vulnerability and likely included a likely inflated …
Researchers from AT&T’s Alien Labs have detected malware that targets endpoints and Internet of Things (IoT) devices running Linux. The malware, which is being called “Shikitega is delivered in a multistage infection chain where each module responds to a part of the payload and downloads and executes the next one.” Shikitega could be exploited to …
What is Swap Space? Linux has the facility to divide physical RAM into tiny chunks of memory called Pages. Swapping is a method by which a page of memory can be copied to the pre-configured space on the hard disk which is called Swap Space, to free that particular page of memory. Thus, the combination …
We want to let you know that running very old versions of Microsoft Defender for Endpoint (MDE) can result in an invalid agent state and loss of protection. Mobile device management (MDM) previously configured to deploy very old MDE version may expose your organization to the risk of the invalid agent state and protection loss. …
This article describes effective troubleshooting methods and data collection strategies. Use a systematic approach to troubleshooting with the scientific method. Collect system information to support troubleshooting. Use Red Hat resources to support troubleshooting. Red Hat Enterprise Linux Diagnostics and Troubleshooting Strategy Content Summary Using the Scientific Method Collecting Information to Support Troubleshooting Troubleshooting with Red …
Question Is there a free and robust solution to collect server logs from about 100 Linux systems and Apache servers to refer to when there are security accidents like scanning from outside IPs?
Linux is arguably the best operating system to take advantage of the new generation of computer hardware. However, device manufacturers face a dilemma today: whether to roll their own Linux distribution as an internal platform for embedded projects, or whether to use a commercially supported embedded Linux distribution. Thanks to its permissive and royalty-free licensing …
Problem: How to remove user from staff group in Oracle Linux/Unix Solaris? calapp@hostname:/$ sudo usermod -G oracle calapp Password: calapp@hostname:/$ id uid=100(calapp) gid=10(staff)
Linux is a free and open-source operating system. It’s been around since 1991, but it continues to be an important alternative choice away from Windows and Mac. We’ve put together this collection of cheat sheets that you can follow to help you navigate the operating system and its programs effectively and get the most out …
Cloud-native development is application development, deployment, and operational discipline, spanning people, process, and technology to speed up high-quality application production. Cloud-native development is a common term today, but is it more than just a buzzword? Could it be the next phase of modern application development?
Recently, Red Hat announced Red Hat Insights’ inclusion inside Enterprise Linux subscription packages—and diligent users are coming armed with questions. Inside, unpack answers to the top FAQs about Insights best practices.
Not only Windows and Mac, but even Linux systems can also fall victim to cyberattacks. This article helps IT sysadmins improve their existing Linux security procedures. Securing endpoints can an overwhelming routine for system administrators, especially when they’re remote. Considering much of the world is now working remotely and may continue to do so in …
This article serves as a blueprint for any enterprise looking to build a containerized hybrid cloud. Inside, learn how Red Hat can help your team establish unified hybrid solutions and consistent cloud infrastructure, with a focus on container management.
Most organizations use varied IT stacks within their business. You may have a Linux server farm and use a Microsoft Active Directory cluster to provide identity services. Or you may maintain a cross-platform environment that builds software for multiple targets. As environments become more and more complex, manually managing each of the different components can …