Book Mark

BOOKMARK
Click "Tag Page" to bookmark a page. When you return to the site, click "Goto Tag" to continue where you left off.
Goto TagClear Tag

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories↓
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools↓
    • IP Checker
    • Byte Converter
RSS

Debian: 2923-1: openjdk-7: Summary

May06
by Ike on May 6, 2014 at 3:17 am
Posted In: Other

(May 5) Security Report Summary

 Comment 

Ubuntu: 2187-1: OpenJDK 7 vulnerabilities

May06
by Ike on May 6, 2014 at 2:38 am
Posted In: Other

(Apr 30) Several security issues were fixed in OpenJDK 7.

 Comment 

Ubuntu: 2192-1: OpenSSL vulnerabilities

May06
by Ike on May 6, 2014 at 2:38 am
Posted In: Other

(May 5) OpenSSL could be made to crash if it received specially crafted networktraffic.

 Comment 

SHA-2: Very cryptographic. So secure. Such growth. Wow.

May05
by Ike on May 5, 2014 at 4:15 pm
Posted In: security

Use of the SHA-2 cryptographic signature algorithm has received a significant boost in the wake of the Heartbleed Bug.

More than half a million SSL certificates were potentially compromised as a result of the Heartbleed vulnerability — affected certificates require urgent re-issuance and revocation. The good news is that many of the new certificates have been signed with the SHA-2 algorithm instead of the less secure SHA-1 algorithm, which has helped the total number of certificates signed with SHA-2 increase by more than 50% over the past month.

Practical attacks against the SHA-1 algorithm are now within reach of government agencies, giving them the opportunity to construct a pair of different SSL certificates with the same SHA-1 digest. Ultimately, this could enable an attacker to impersonate secure websites using a variant of the attack that worked against MD5 in 2008. This attack is, however, made more difficult by path constraints and the inclusion of unpredictable data into the certificate before signing it.

Even before the Heartbleed bug was announced, the migration to SHA-2 was inevitable, if not rapid. The long-term shift to SHA-2 is being fuelled by Microsoft’s SHA-1 deprecation policy: Windows will stop accepting certificates signed using SHA-1 from 2017. It is in the interest of certificate authorities to begin the migration as soon as possible, otherwise long-term certificates could become useless partway through their lifetime.

In response to the potential dangers, the National Institute of Standards and Technology (NIST) issued a special publication which disallowed the use of SHA-1 after December 2013. Embarrassingly, NIST ignored its own recommendation and deployed a SHA-1 certificate on its own secure website at www.nist.gov in January 2014.

NIST was not alone in being slow to heed its recommendations: more than 92% of all SSL certificates issued in January were signed with SHA-1. However, the number of certificates using SHA-1 has noticeably declined in the past couple of months. This shift has undoubtedly been assisted by the publication of the Heartbleed Bug, prompting website administrators to deploy new SSL certificates long before their existing certificates were due to expire.

Nearly 200,000 valid third-party certificates are now signed with SHA-2. Despite showing impressive growth, certificates signed with SHA-2 account for 6.6% of all valid third-party certificates currently in use on the web; but this is still a significant jump from last month’s share of 4.3%, and is likely to continue at a strong rate.

SHA-1 vs. SHA-2 (May 2014)

The latest version of the CA/Browser Forum’s Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates [PDF] states that SHA-1 may still be used in subscriber certificates until SHA-256 (part of the SHA-2 family) is supported by a substantial portion of relying-parties worldwide. Arguably, this time has long passed — even Windows XP, which is no longer supported by Microsoft, has been able to accept certificates signed with SHA-256, SHA-384 and SHA-512 since the release of Service Pack 3 in 2008.

└ Tags: Heartbleed Bug, NIST, security, SHA, SSL
 Comment 

Ubuntu: 2188-1: elfutils vulnerability

May05
by Ike on May 5, 2014 at 2:35 am
Posted In: Other

(Apr 30) elfutils could be made to crash or run programs if it processed a speciallycrafted file.

└ Tags: vulnerability
 Comment 
  • Page 2,239 of 2,781
  • « First
  • «
  • 2,237
  • 2,238
  • 2,239
  • 2,240
  • 2,241
  • »
  • Last »

What’s New?

  • Fedora 41: 2025-a32ccde763 moderate: php-adodb SQL injection
  • Fedora 41: FEDORA-2025-d23a07ad00 moderate: Deluge security updates
  • Fedora 41: Security Advisory FEDORA-2025-051becf4f2 on xz 5.8.1
  • Fedora 41: epiphany 2025-164c668d6a critical: external protocol issue
  • Debian DSA-5917-1: Critical DoS in libapache2-mod-auth-openidc
  • Ubuntu 24.10 and 24.04 LTS USN-7503-1: python-h11 info leak issue
  • Ubuntu 18.04 LTS USN-7501-2: Django denial of service issue
  • Ubuntu 25.04 LTS: USN-7501-1 critical: Django denial of service
  • Debian: DSA-5916-1 severe: chromium remote code execution risk
  • Ubuntu 18.04 LTS: USN-7502-1 critical: Horde Css Parser remote execution
  • WordPress Campus Connect Expands
  • Ubuntu 24.10: 7489-2 critical linux-realtime system crash
  • Ubuntu 22.04 LTS USN-7500-2: Security Update for Azure Kernel
  • Ubuntu 18.04 LTS USN-7496-5 critical: Linux kernel Azure FIPS security fix
  • Ubuntu 14.04 LTS: USN-7496-4 critical: Linux kernel security corrections
  • Fedora 41: 2025-88025e98b2 critical: nodejs20 use-after-free
  • Fedora 41: incus update 2025-5fce1e4f70 critical: DoS issues fixed
  • Fedora 42: 2025-e4d441a4dd critical: incus denial of service fixes
  • Ubuntu 24.10: USN-7488-1 critical alert for Python SSRF and DoS issues
  • Ubuntu 24.04 LTS: USN-7476-1 moderate: python-scrapy denial of service
  • Top 10 Social Media Management Tools for Agencies
  • Fedora 41: FEDORA-2025-8fbc37e703 critical: chromium issues
  • Fedora 41: FEDORA-2025-eecb0ea534 critical: kappanhang HTTP bypass
  • Ubuntu 25.04: USN-7479-1 critical: MySQL multiple security issues
  • Ubuntu 24.10: USN-7478-1 critical: Corosync denial of service

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
May 2025
M T W T F S S
« Apr    
 1234
567891011
12131415161718
19202122232425
262728293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

53 queries. 8.75 mb Memory usage. 0.321 seconds.