LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-15-2022, 10:48 AM   #1
//////
Member
 
Registered: Nov 2005
Location: Land of Linux :: Finland
Distribution: Arch Linux && OpenBSD 7.4 && Pop!_OS && Kali && Qubes-Os
Posts: 824

Rep: Reputation: 350Reputation: 350Reputation: 350Reputation: 350
Google Chrome zeroday at wild.


https://www.bleepingcomputer.com/new...ed-in-attacks/

update if you can
or use other browser for a while.
 
Old 02-16-2022, 08:03 AM   #2
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,616

Rep: Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555

Is this really news when Chrome's average is more than one a month?

Or perhaps the news is simply that there was a whole two months since the last such vulnerability was discovered in Chrome?

 
1 members found this post helpful.
Old 02-16-2022, 08:46 AM   #3
//////
Member
 
Registered: Nov 2005
Location: Land of Linux :: Finland
Distribution: Arch Linux && OpenBSD 7.4 && Pop!_OS && Kali && Qubes-Os
Posts: 824

Original Poster
Rep: Reputation: 350Reputation: 350Reputation: 350Reputation: 350
nah, it isnt "news" i think, but someone could benefit of this post.
 
Old 02-16-2022, 11:21 AM   #4
rokytnji
LQ Veteran
 
Registered: Mar 2008
Location: Waaaaay out West Texas
Distribution: antiX 23, MX 23
Posts: 7,144
Blog Entries: 21

Rep: Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482Reputation: 3482
It reminded me to sudo apt update and sudo apt dist-upgrade before firing up any gear lately.
Thanks.
 
Old 02-16-2022, 01:37 PM   #5
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,679
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
It also reinforces the importance of the so-called "Principle of Least Privilege."

Which is to say that – and this is true of every operating system – "the account that you use every day" must not be "an Administrator." (In Linux, this means: "a member of the wheel group.") Windows ... MacOS (OS/X) ... mainframe ... doesn't matter.

If anyone or anything that is operating under your credentials "runs into a nearby phone booth," it should not be capable of flying out of it wearing ugly blue tights. It should be operating in a "home directory" that isn't accessible to other users of the same system, and it shouldn't be able to snoop into anyone else's home – let alone have write access to it. It cannot issue the sudo su command, because it is not required to.

Do not give yourself any more access to your system than you require when exercising the tasks which you have associated with that particular login account. (After all, you can have as many accounts as you please.) Don't allow anyone else access to "your stuff" except to the extent that a specific other user-id requires it.

By voluntarily limiting "your" access to "your" system based on need to know or do, you immediately make your system far more secure ... and it really isn't that "inconvenient" once you get used to it. "Be Jimmy Olsen, not Clark Kent."

Beyond that – find a good continuous backup system, and use it 100% of the time.

Last edited by sundialsvcs; 02-16-2022 at 01:44 PM.
 
1 members found this post helpful.
Old 02-21-2022, 09:14 AM   #6
Trihexagonal
Member
 
Registered: Jul 2017
Posts: 362
Blog Entries: 1

Rep: Reputation: 334Reputation: 334Reputation: 334Reputation: 334
Quote:
Originally Posted by sundialsvcs View Post
It also reinforces the importance of the so-called "Principle of Least Privilege."

Which is to say that – and this is true of every operating system – "the account that you use every day" must not be "an Administrator." (In Linux, this means: "a member of the wheel group.") Windows ... MacOS (OS/X) ... mainframe ... doesn't matter.
Yes it does. That is not true of every system.

I'm a member of the wheel group but can't invoke root commands from my usr account:

Code:
jitte@unmei:~ $ groups
jitte wheel operator
jitte@unmei:~ $ whoami
jitte
jitte@unmei:~ $ freebsd-update fetch
freebsd-update: Directory does not exist or is not writable: /var/db/freebsd-update
jitte@unmei:~ $ su
Password:
root@unmei:/home/jitte # cd /
root@unmei:/ # freebsd-update fetch
Looking up update.FreeBSD.org mirrors... 2 mirrors found.
Fetching metadata signature for 13.0-RELEASE from update1.freebsd.org... done.
Fetching metadata index... done.
Inspecting system... done.
Preparing to download files... done.

No updates needed to update system to 13.0-RELEASE-p7.
root@unmei:/ #
 
Old 02-26-2022, 12:17 PM   #7
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,679
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
The question is whether you can enter the command: sudo su, then enter your own password, and wind up with a "#" prompt . . .

There should be only one user-id on any system, IMHO, which is capable of doing that.

As I've said here before, "your computer is just too damned stupid to know when it should say 'yes!'" But it's extremely good at saying 'no!' Leverage that idea to your full advantage, and also be sure that your "all-powerful user" is named (say ...) freddie. It really isn't "inconvenient" after all ...

Last edited by sundialsvcs; 02-26-2022 at 12:26 PM.
 
Old 02-26-2022, 09:05 PM   #8
Trihexagonal
Member
 
Registered: Jul 2017
Posts: 362
Blog Entries: 1

Rep: Reputation: 334Reputation: 334Reputation: 334Reputation: 334
You were right all along and I was wrong from the start.
Hear that often? Hmmm?

My Gehirndose full of toxins, shutdown progressing, Dave


Quote:
Originally Posted by sundialsvcs View Post
The question is whether you can enter the command: sudo su, then enter your own password, and wind up with a "#" prompt . . .
I had never used sudo till a few years when I tested TrueOS, DandyOS or whatever they called it that week.
On FreeBSD I always su to root in a terminal, work as root from that terminal and log out to my usr account when done.
I've never installed sudo or doas and am very comfortable working as root, but do not log in as root or run as r00t after my work s done.
Kali has sudo and I don't use the root account on it.

Quote:
Originally Posted by sundialsvcs View Post
There should be only one user-id on any system, IMHO, which is capable of doing that.

As I've said here before, "your computer is just too damned stupid to know when it should say 'yes!'" But it's extremely good at saying 'no!' Leverage that idea to your full advantage, and also be sure that your "all-powerful user" is named (say ...) freddie. It really isn't "inconvenient" after all ...
I bend the machine to my will and it does things my way. Which in many ways is not the standard way things are done by everyone else, the Handbook not a factor when I figured it out. I've never looked at fstab for one thing.
 
Old 03-01-2022, 07:46 PM   #9
dc.901
Senior Member
 
Registered: Aug 2018
Location: Atlanta, GA - USA
Distribution: CentOS/RHEL, openSuSE/SLES, Ubuntu
Posts: 1,005

Rep: Reputation: 370Reputation: 370Reputation: 370Reputation: 370
Depending on how critical the system is, it may be useful to also setup MFA - even for sudo.
 
Old 03-01-2022, 08:52 PM   #10
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,679
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
It has certainly not escaped my attention that "other Unix®/Linux based systems that I regularly frequent," namely MacOS/OSX, no longer permit even "the root user" unfettered privileges.

Instead, just like "UEFI," they now require a first-action that is physical, therefore distinctly human. Without this, even "the root user" is now "fettered." And, "I agree with this."

Last edited by sundialsvcs; 03-01-2022 at 08:53 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Chrome OS is not dead, insists Google veep in charge of Chrome OS LXer Syndicated Linux News 0 10-31-2015 05:11 AM
LXer: Google Releases Chrome 44 Stable for Windows, Mac OS X, Linux, and Chrome OS LXer Syndicated Linux News 0 07-21-2015 07:03 PM
Google Chrome New Tab Page (!)= Chrome OS Desktop Kenny_Strawn Linux - General 6 02-19-2011 05:36 PM
LXer: As Goes Chrome OS, So Goes Google's Chrome Browser LXer Syndicated Linux News 4 10-09-2010 03:18 PM
LXer: [Wild Conjecture] Chrome OS As I Imagine It LXer Syndicated Linux News 1 07-21-2009 06:19 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:43 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration