Mcafee Policy Auditor Content Update V1329

Total Page:16

File Type:pdf, Size:1020Kb

Mcafee Policy Auditor Content Update V1329 2021-Aug-31 McAfee Policy Auditor Content Update Summary Product / Version Content Version McAfee Policy Auditor 6.x 1329 New Checks Oval ID Title oval:com.mcafee.oval.common:def:2938402 Apple iTunes Security Update 12.11.4 for Windows oval:com.mcafee.oval.common:def:2938405 Google Chrome Security Update 92.0.4515.131 for Windows oval:com.mcafee.oval.common:def:2938408 Google Chrome Security Update 92.0.4515.159 for Windows oval:com.mcafee.oval.common:def:2938411 Mozilla Firefox Security Update 91.0 for Windows oval:com.mcafee.oval.common:def:2938417 Mozilla Firefox ESR Security Update 78.13 for Windows oval:com.mcafee.oval.common:def:2938426 Mozilla Thunderbird Security Update 78.13 for Windows oval:com.mcafee.oval.common:def:2938432 Mozilla Thunderbird Security Update 91.0 for Windows oval:com.mcafee.oval.common:def:2938438 Mozilla Firefox Security Update 91.0.1 for Windows oval:com.mcafee.oval.common:def:2938441 Mozilla Thunderbird Security Update 91.0.1 for Windows oval:com.mcafee.oval.gen:def:439863 compat-exiv2 patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439866 exiv2 patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439869 exiv2-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439872 exiv2-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439876 exiv2-libs patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439879 exiv2-libs-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439883 libipa_hbac patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439886 libipa_hbac-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439890 libsss_autofs patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439893 libsss_autofs-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439897 libsss_certmap patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439900 libsss_certmap-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439904 libsss_idmap patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439907 libsss_idmap-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439911 libsss_nss_idmap patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439914 libsss_nss_idmap-debuginfo patch for Redhat EL8 Oval ID Title oval:com.mcafee.oval.gen:def:439918 libsss_simpleifp patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439921 libsss_simpleifp-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439925 libsss_sudo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439928 libsss_sudo-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439932 python3-libipa_hbac patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439936 python3-libipa_hbac-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439940 python3-libsss_nss_idmap patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439944 python3-libsss_nss_idmap-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439948 python3-sss patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439952 python3-sss-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439956 python3-sss-murmur patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439960 python3-sss-murmur-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439964 python3-sssdconfig patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439968 sssd patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439971 sssd-ad patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439974 sssd-ad-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439978 sssd-client patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439981 sssd-client-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439985 sssd-common patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439988 sssd-common-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439992 sssd-common-pac patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439995 sssd-common-pac-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:439999 sssd-dbus patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440002 sssd-dbus-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440006 sssd-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440009 sssd-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440013 sssd-ipa patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440016 sssd-ipa-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440020 sssd-kcm patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440023 sssd-kcm-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440027 sssd-krb5 patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440030 sssd-krb5-common patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440033 sssd-krb5-common-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440037 sssd-krb5-debuginfo patch for Redhat EL8 Oval ID Title oval:com.mcafee.oval.gen:def:440041 sssd-ldap patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440044 sssd-ldap-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440048 sssd-libwbclient patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440051 sssd-libwbclient-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440055 sssd-nfs-idmap patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440059 sssd-nfs-idmap-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440063 sssd-polkit-rules patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440066 sssd-proxy patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440069 sssd-proxy-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440073 sssd-tools patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440076 sssd-tools-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440080 sssd-winbind-idmap patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440083 sssd-winbind-idmap-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440087 aspnetcore-runtime patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440091 aspnetcore-targeting-pack patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440095 dotnet patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440099 dotnet-apphost-pack patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440103 dotnet-host patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440107 dotnet-host-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440111 dotnet-hostfxr patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440115 dotnet-runtime patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440119 dotnet-sdk patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440123 dotnet-targeting-pack patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440127 dotnet-templates patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440131 dotnet5.0-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440135 dotnet5.0-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440139 netstandard-targeting-pack patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440143 dotnet-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440147 dotnet-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440151 dotnet-host-fxr patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440155 dotnet3.1-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440159 dotnet3.1-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440163 cloud-init patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440166 389-ds-base patch for Redhat EL8 Oval ID Title oval:com.mcafee.oval.gen:def:440169 389-ds-base-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440172 389-ds-base-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440176 389-ds-base-devel patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440179 389-ds-base-legacy-tools patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440183 389-ds-base-legacy-tools-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440187 389-ds-base-libs patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440190 389-ds-base-libs-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440194 389-ds-base-snmp patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440197 389-ds-base-snmp-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440201 python3-lib389 patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440205 golang-docs patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440208 golang-misc patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440211 golang-src patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440214 golang-tests patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440217 delve patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440221 delve-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440225 delve-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440229 go-toolset patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440233 golang patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440236 golang-bin patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440239 golang-race patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440243 libuv patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440247 libuv-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440251 libuv-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440255 nodejs patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440259 nodejs-debuginfo patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440263 nodejs-debugsource patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440267 nodejs-devel patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440271 nodejs-docs patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440275 nodejs-full-i18n patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440279 nodejs-nodemon patch for Redhat EL8 oval:com.mcafee.oval.gen:def:440283
Recommended publications
  • Enable USB Drivers on Linux
    Enable USB drivers on Linux INTHISDOCUMENT · Enable USB driver on system with USBFS support · Enable USB driver on system without USBFS support · Additional notes for FTDI/XTAG debug adapters The XMOS tools interface to development boards using USB debug adapters. USB driver support is provided natively on Linux, but in some cases, the driver must be enabled. The method required to enable the driver depends on the Linux distribution you are using and the kernel version. Linux distributions known to provide USBFS support include: · Ubuntu 9.04 or older · Ubuntu 9.10 with kernel 2.6.31-19-server · CentOS 4.8 and 5.4 · Generally, any distribution with kernel version < 2.6.32 Linux distributions known to not provide USBFS support include: · Ubuntu 10.04 · Generally, any distribution with kernel version >= 2.6.32 1 Enable USB driver on system with USBFS support If your distribution provides USBFS support, use the following command to enable the Linux driver: · mount -t usbfs none /proc/bus/usb -o devmode=0666 To automatically enable the driver on boot, add the following line to the file /etc/fstab: none /proc/bus/usb usbfs defaults,devmode=0666 0 0 Publication Date: 2012/10/30 Document Number: X2612A XMOS © 2012, All Rights Reserved Enable USB drivers on Linux 2/3 2 Enable USB driver on system without USBFS support If you distribution does not provide USBFS support, you must configure udev to recognise the device. To configure udev, follow these steps: 1. Create a file /etc/udev/rules.d/99-xmos.rules with the following contents: SUBSYSTEM!="usb|usb_device", GOTO="xmos_rules_end" ACTION!="add", GOTO="xmos_rules_end" # 20b1:f7d1 for xmos xtag2 ATTRS{idVendor}=="20b1", ATTRS{idProduct}=="f7d1", MODE="0666", SYMLINK+="xtag2-%n" # 0403:6010 for XC-1 with FTDI dual-uart chip ATTRS{idVendor}=="0403", ATTRS{idProduct}=="6010", MODE="0666", SYMLINK+="xc1-%n" LABEL="xmos_rules_end" The ATTRS, MODE and SYMLINK stanzas must be all on one line, as each rule can only be on one line.
    [Show full text]
  • Flexible Lustre Management
    Flexible Lustre management Making less work for Admins ORNL is managed by UT-Battelle for the US Department of Energy How do we know Lustre condition today • Polling proc / sysfs files – The knocking on the door model – Parse stats, rpc info, etc for performance deviations. • Constant collection of debug logs – Heavy parsing for common problems. • The death of a node – Have to examine kdumps and /or lustre dump Origins of a new approach • Requirements for Linux kernel integration. – No more proc usage – Migration to sysfs and debugfs – Used to configure your file system. – Started in lustre 2.9 and still on going. • Two ways to configure your file system. – On MGS server run lctl conf_param … • Directly accessed proc seq_files. – On MSG server run lctl set_param –P • Originally used an upcall to lctl for configuration • Introduced in Lustre 2.4 but was broken until lustre 2.12 (LU-7004) – Configuring file system works transparently before and after sysfs migration. Changes introduced with sysfs / debugfs migration • sysfs has a one item per file rule. • Complex proc files moved to debugfs • Moving to debugfs introduced permission problems – Only debugging files should be their. – Both debugfs and procfs have scaling issues. • Moving to sysfs introduced the ability to send uevents – Item of most interest from LUG 2018 Linux Lustre client talk. – Both lctl conf_param and lctl set_param –P use this approach • lctl conf_param can set sysfs attributes without uevents. See class_modify_config() – We get life cycle events for free – udev is now involved. What do we get by using udev ? • Under the hood – uevents are collect by systemd and then processed by udev rules – /etc/udev/rules.d/99-lustre.rules – SUBSYSTEM=="lustre", ACTION=="change", ENV{PARAM}=="?*", RUN+="/usr/sbin/lctl set_param '$env{PARAM}=$env{SETTING}’” • You can create your own udev rule – http://reactivated.net/writing_udev_rules.html – /lib/udev/rules.d/* for examples – Add udev_log="debug” to /etc/udev.conf if you have problems • Using systemd for long task.
    [Show full text]
  • ANDROID PRIVACY THROUGH ENCRYPTION by DANIEL
    ANDROID PRIVACY THROUGH ENCRYPTION by DANIEL DEFREEZ A THESIS Presented to the Department of Computer Science in partial fullfillment of the requirements for the degree of Master of Science in Mathematics and Computer Science Ashland, Oregon May 2012 ii APPROVAL PAGE “Android Privacy Through Encryption,” a thesis prepared by Daniel DeFreez in partial fulfillment of the requirements for the Master of Science in Mathematics and Computer Science. This project has been approved and accepted by: Dr. Lynn Ackler, Chair of the Examining Committee Date Pete Nordquist, Committee Member Date Hart Wilson, Committee Member Date Daniel DeFreez c 2012 iii ABSTRACT OF THESIS ANDROID PRIVACY THROUGH ENCRYPTION By Daniel DeFreez This thesis explores the field of Android forensics in relation to a person’s right to privacy. As the field of mobile forensics becomes increasingly sophisticated, it is clear that bypassing common privacy measures, such as disk encryption, will become routine. A new keying method for eCryptfs is proposed that could significantly mitigate memory attacks against encrypted file systems. It is shown how eCryptfs could be modified to implement this keying method on an Android device. iv ACKNOWLEDGMENTS I would like to thank Dr. Lynn Ackler for introducing me to the vast world of computer security and forensics, cultivating a healthy paranoia, and for being a truly excellent teacher. Dr. Dan Harvey, Pete Nordquist, and Hart Wilson provided helpful feedback during the preparation of this thesis, for which I thank them. I am deeply indebted to my friends and colleagues Brandon Kester, Andrew Krug, Adam Mashinchi, Jeff McJunkin, and Stephen Perkins, for their enthusiastic interest in the forensics and security fields, insightful comments, love of free software, and encouraging words.
    [Show full text]
  • Installing a Real-Time Linux Kernel for Dummies
    Real-Time Linux for Dummies Jeroen de Best, Roel Merry DCT 2008.103 Eindhoven University of Technology Department of Mechanical Engineering Control Systems Technology group P.O. Box 513, WH -1.126 5600 MB Eindhoven, the Netherlands Phone: +31 40 247 42 27 Fax: +31 40 246 14 18 Email: [email protected], [email protected] Website: http://www.dct.tue.nl Eindhoven, January 5, 2009 Contents 1 Introduction 1 2 Installing a Linux distribution 3 2.1 Ubuntu 7.10 . .3 2.2 Mandriva 2008 ONE . .6 2.3 Knoppix 3.9 . 10 3 Installing a real-time kernel 17 3.1 Automatic (Ubuntu only) . 17 3.1.1 CPU Scaling Settings . 17 3.2 Manually . 18 3.2.1 Startup/shutdown problems . 25 4 EtherCAT for Unix 31 4.1 Build Sources . 38 4.1.1 Alternative timer in the EtherCAT Target . 40 5 TUeDACs 43 5.1 Download software . 43 5.2 Configure and build software . 44 5.3 Test program . 45 6 Miscellaneous 47 6.1 Installing ps2 and ps4 printers . 47 6.1.1 In Ubuntu 7.10 . 47 6.1.2 In Mandriva 2008 ONE . 47 6.2 Configure the internet connection . 48 6.3 Installing Matlab2007b for Unix . 49 6.4 Installing JAVA . 50 6.5 Installing SmartSVN . 50 6.6 Ubuntu 7.10, Gutsy Gibbon freezes every 10 minutes for approximately 10 sec 51 6.7 Installing Syntek Semicon DC1125 Driver . 52 Bibliography 55 A Menu.lst HP desktop computer DCT lab WH -1.13 57 i ii CONTENTS Chapter 1 Introduction This document describes the steps needed in order to obtain a real-time operating system based on a Linux distribution.
    [Show full text]
  • Referência Debian I
    Referência Debian i Referência Debian Osamu Aoki Referência Debian ii Copyright © 2013-2021 Osamu Aoki Esta Referência Debian (versão 2.85) (2021-09-17 09:11:56 UTC) pretende fornecer uma visão geral do sistema Debian como um guia do utilizador pós-instalação. Cobre muitos aspetos da administração do sistema através de exemplos shell-command para não programadores. Referência Debian iii COLLABORATORS TITLE : Referência Debian ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki 17 de setembro de 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Referência Debian iv Conteúdo 1 Manuais de GNU/Linux 1 1.1 Básico da consola ................................................... 1 1.1.1 A linha de comandos da shell ........................................ 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 A conta root .................................................. 2 1.1.4 A linha de comandos shell do root ...................................... 3 1.1.5 GUI de ferramentas de administração do sistema .............................. 3 1.1.6 Consolas virtuais ............................................... 3 1.1.7 Como abandonar a linha de comandos .................................... 3 1.1.8 Como desligar o sistema ........................................... 4 1.1.9 Recuperar uma consola sã .......................................... 4 1.1.10 Sugestões de pacotes adicionais para o novato ................................ 4 1.1.11 Uma conta de utilizador extra ........................................ 5 1.1.12 Configuração
    [Show full text]
  • The Whole Disk
    COVER STORY DM-Crypt/ LUKS Workshop: Encrypting hard disks with DM-Crypt and LUKS THE WHOLE DISK Encrypting a home directory is easy. Encrypting your whole hard disk – including the root filesystem – takes a little more effort. BY MICHAEL NERB ncrypting individual filesystems means you’ll need to roll up your shirt is no big deal; in fact, some dis- sleeves for some hands-on configuration. Etributions allow you to encrypt In this workshop, we will start by in- directories as part of the installation rou- stalling a standard Linux system and tine. But encrypting the home directory then progress to encrypting the existing on your laptop is a job half done. Dis- filesystems one at a time. We will finish honest finders can still draw conclusions off by deleting the unprotected partition from log and configuration files. If you’re and using the space for other tasks, such serious about providing security through as swapping out the /home directory to encryption, you need to protect the an encrypted partition of its own. whole hard disk against spying – some- Our goal is to encrypt the entire hard thing that no distribution can do out of disk (with the exception of the partition the box. table in the Master Boot Record). Be- Things start to become more complex cause it isn’t possible to encrypt the boot if you need to protect the root filesystem. partition, we will move /boot to an exter- Neither Suse nor Debian Linux give nal medium – a USB stick, in this case. users a tool to help encrypt the root file- To boot from the stick, we will need to system during the install (or later).
    [Show full text]
  • Linux Enumeration of Nics Version 4.1
    Linux Enumeration of NICs Version 4.1 By Robert Hentosh <[email protected]>, Matt Domsch <[email protected]> and Narendra K <[email protected]> . September 2009 Abstract Linux naming of the hardware network interfaces may not align with BIOS and chassis labeling of the Ethernet ports. This is seen on Dell PowerEdge 1950, 1955, 2900, 2950 and newer servers when using a Linux 2.6 kernel-based product such as Red Hat Enterprise Linux 4, 5 and Novell/SuSE Linux Enterprise Server 9, 10 and 11. Solutions to align the Linux name with the expected name are presented. Introduction System administrators may expect the onboard network ports labeled Gb1, Gb2, etc... on a system to be assigned interface names eth0, eth1, etc... respectively. This would be one possible naming convention for network interfaces; however no industry standards currently exist to ensure such a convention. The method used in Linux to determine the number associated with a network port (i.e. eth0, eth1, eth2…) is complex and changed with the 2.6 and newer kernels. The naming disconnect can be observed at two different times: 1. Install Time - OS Installation when network booting (e.g. using a PXE installation procedure); 2. System Runtime – Following OS installation Dell engineers have developed workarounds for Red Hat Enterprise Linux 4 (RHEL4), 5 (RHEL5), and Novell/SuSE Linux Enterprise Server (SLES) 9, 10 and 11 for each of the above scenarios. While the naming disconnect directly affects Dell PowerEdge 1950, 1955, 2900, 2950 and newer servers running Linux 2.6 kernels (eg. RHEL4, RHEL5 , SLES9, SLES10 and SLES 11), this behavior is not unique to Dell systems.
    [Show full text]
  • Zynq Ultrascale+ Mpsoc TRD User Guide (UG1221)
    Zynq UltraScale+ MPSoC Base Targeted Reference Design User Guide UG1221 (v2016.4) March 22, 2017 Revision History The following table shows the revision history for this document. Date Version Revision 03/22/2017 2016.4 Released with Vivado Design Suite 2016.4 with no changes from previous version. 12/15/2016 2016.3 Updated for Vivado Design Suite 2016.3: Updated Reference Design Overview. Replaced Chapter 2, Reference Design. Updated Figure 3-1 and the following paragraph. Updated Figure 4-1 and perfapm library descriptions in Chapter 4, RPU-1 Software Stack (Bare-metal). Updated Figure 6-1, Figure 6-2, and DDR region descriptions under Memories in Chapter 6. Updated Figure 7-1, Figure 7-4, and Figure 7-5. Added X11 section, deleted first paragraph under EGLFS QPA, and modified “Evdev” section to “Libinput” in Chapter 7, APU Software Platform. Updated Table 8-2 and clock descriptions under Clocks, Resets and Interrupts in Chapter 8. 07/22/2016 2016.2 Updated for Vivado Design Suite 2016.2: Added “GPU” to hardware interfaces and IP under Key Features. Changed link under Design Modules from the wiki site to the HeadStart Lounge and updated link under Tutorials to the Base TRD wiki site. Deleted steps 2 and 4 under Tutorials and added reference tutorial (last bullet). Added second to last sentence to second paragraph under Boot Process. Added “Load PMU FW” component to Figure 6-1. Clarified Message Passing section (text only). Changed “PCA9546” to PCA9548” in Figure 8-7. 06/29/2016 2016.1 Initial Xilinx release. Zynq UltraScale+ MPSoC Base TRD www.xilinx.com Send Feedback 2 UG1221 (v2016.4) March 22, 2017 Table of Contents Revision History .
    [Show full text]
  • Automated Malware Analysis Report for Sqlninja 0
    ID: 130390 Sample Name: sqlninja_0.2.6- r1-1raring0_all.deb Cookbook: defaultlinuxfilecookbook.jbs Time: 20:49:43 Date: 09/05/2019 Version: 26.0.0 Aquamarine Table of Contents Table of Contents 2 Analysis Report sqlninja_0.2.6-r1-1raring0_all.deb 4 Overview 4 General Information 4 Detection 4 Classification 4 Mitre Att&ck Matrix 5 Signature Overview 5 AV Detection: 6 Networking: 6 System Summary: 6 Persistence and Installation Behavior: 6 Malware Analysis System Evasion: 6 Runtime Messages 6 Behavior Graph 6 Yara Overview 7 Initial Sample 7 PCAP (Network Traffic) 7 Dropped Files 7 Joe Sandbox View / Context 7 IPs 7 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Antivirus and Machine Learning Detection 8 Initial Sample 8 Dropped Files 8 Domains 9 URLs 9 Screenshots 9 Thumbnails 9 Startup 9 Created / dropped Files 10 Domains and IPs 12 Contacted Domains 12 Contacted IPs 12 Public 12 Static File Info 12 General 12 Network Behavior 13 Network Port Distribution 13 TCP Packets 13 UDP Packets 13 DNS Queries 13 DNS Answers 13 HTTPS Packets 13 System Behavior 14 Analysis Process: gnome-software PID: 20951 Parent PID: 20139 14 General 14 File Activities 14 File Deleted 14 File Read 14 File Written 14 Directory Enumerated 14 Directory Created 14 Owner / Group Modified 14 Permission Modified 14 Analysis Process: gnome-software PID: 20974 Parent PID: 20951 14 General 14 Copyright Joe Security LLC 2019 Page 2 of 19 File Activities 15 Directory Enumerated 15 Analysis Process: dbus-launch PID: 20974 Parent PID: 20951 15 General 15 File Activities
    [Show full text]
  • Using Udev LINUXUSER Deviceusing Udev JUNGLE
    Command Line: Using udev LINUXUSER DEVICEUsing udev JUNGLE Learn how to create your own udev rules and deploy command-line tools to monitor and control udev events to clear your way through www.sxc.hu the Linux device jungle. BY HEIKE JURZIK n the past few years, Linux has pro- To keep everything running smoothly, udev on /dev type tmpfs (rw,mode gressed in the field of hardware de- udev needs rules that it references to dis- =0755) Itection and management. The days cover a device’s name and how to han- ... of static device files huddled below the dle the device. /dev directory are long gone, and Devfs Listing 1: Rules is also obsolete. Since kernel 2.6, udev Device Garage 01 $ ls -la /etc/udev/rules.d/ [1] has been responsible for handling The udev “repository” is the /dev direc- 02 ... both the device filesystem and Hotplug, tory, which is where the device files that which includes setting up the required allow applications to access hardware 03 lrwxrwxrwx 1 root root 20 device files, setting permissions, and reside. If you look inside the folder, you 2007-05-09 23:40 020_ optionally launching certain programs. will see not only the file names for your permissions.rules -> ../ hard disks and partitions (for example, permissions.rules User Space sda, as in sda1, sda2), but also files for 04 lrwxrwxrwx 1 root root 19 In contrast to its predecessors, udev runs CD/ DVD drives (a symlink to cdrom typ- 2007-05-10 00:39 025_ in user space – that is, as a “normal” ically points to the “genuine” device, libgphoto2.rules -> ../ program.
    [Show full text]
  • Tuning Systemd for Embedded
    Tuning systemd for Embedded Alison Chaiken [email protected] Mar. 23, 2015 Latest version: http://she-devel.com/ELC_systemd.pdf Auxiliary files: http://she-devel.com/ELC_auxiliary.tar.bz2 Text in blue is hyperlinked. ? ? ? ? Quiz: what is the most widely used Linux init system? ? ? ? ? phenomenom.” -- Gary Hamel “ Show Action Linux itself.” -- is Linux GKH, Linux “ Valley Silicon Gates,-- Bill industry.” the technology in position “ Success self-correcting Success is a hurt Thethatever thing can only has a guaranteed No one Linux needs to keepinnovating Pirates Pirates of Licensed under CC BY-SA 3.0 http://commons.wikimedia.org/wiki/File:Fire-lite-bg- 10.jpg#mediaviewer/File:Fire-lite-bg-10.jpg Philosophy of systemd Extract duplicate functionality from daemons and move it to systemd core or kernel. Replace /etc scripts with declarative config files. Expose newer kernel APIs to userspace via a simple interface. systemd is: ● modular; ● asynchronous and concurrent; ● described by declarative sets of properties; ● bundled with analysis tools and tests; ● features a fully language-agnostic API. One daemon to rule them all xinetd: a daemon to lazily launch internet services when activity is detected on an AF_INET socket systemd: a daemon to lazily launch any system service when activity is detected on an AF_UNIX socket (oversimplification) Complexity arising from many similar small units init.d scripts systemd units ● Unit's action and parameters: ExecStart= ● Dependencies: Before=, After=, Requires=, Conflicts= and Wants=. ● Default dependencies: – Requires= and After= on basic.target; – Conflicts= and Before= on shutdown.target. ● Types of unit files: service, socket, device, mount, scope, slice, automount, swap, target, path, timer, snapshot sysVinit runlevels ≈ systemd targets ● Targets are synchronization points.
    [Show full text]
  • Oracle® Linux 7 Administrator's Guide
    Oracle® Linux 7 Administrator's Guide E54669-78 October 2020 Oracle Legal Notices Copyright © 2014, 2020, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]