Re: [CentOS] log4j cve

2021-12-15 Thread Ralf Prengel


Zitat von Steve Meier :


Hello Steve,

Am 2021-12-14 14:14, schrieb Steve Clark:

This is the standard version that comes with CentOS 7 and is the
latest available as of a yum update just now.
log4j-1.2.17-16.el7_4.noarch


yes, that's correct, but it is abandoned nonetheless.

According to the RPM's change log, Red Hat backported a fix for  
CVE-2017-5645.

They have not done this for CVE-2019-17571 it seems.
I would be very surprised if they'd do so now.

Kind regards,
  Steve
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos




Tools

alle Links ohne Prüfung auf Inhalt und Qualität

https://log4shell.huntress.com/  (Quelle Sven Kuhnert)

https://therecord.media/log4j-zero-day-gets-security-fix-just-as-scans-for-vulnerable-systems-ramp-up/





Anwendung
BlueTeam CheatSheet * Log4Shell* | Last updated: 2021-12-12 2129 UTC · GitHub



https://logging.apache.org/log4j/2.x/security.html


Presse
https://www.heise.de/news/Log4j-2-16-0-verbessert-Schutz-vor-Log4Shell-Luecke-6294053.html

https://www.golem.de/news/log4j-luecke-warum-log4shell-so-gefaehrlich-ist-und-was-nicht-hilft-2112-161757-4.html

Hinweis: In den Kommentaren zu den Artikeln finden sich Einschätzungen  
und Hinweise neuste Artikel oben


https://www.heise.de/ratgeber/Schutz-vor-schwerwiegender-Log4j-Luecke-was-jetzt-hilft-und-was-nicht-6292961.html

https://www.golem.de/news/log4shell-bsi-vergibt-hoechste-warnstufe-fuer-log4j-luecke-2112-161734.html

https://www.spiegel.de/netzwelt/web/log4j-luecke-bundesbehoerden-von-schwerer-it-schwachstelle-betroffen-a-6cb889d2-ba8d-48f8-a27a-f923bf11b563

https://www.spiegel.de/netzwelt/web/log4-j-schwachstelle-ja-leute-die-scheisse-brennt-lichterloh-a-760bd03d-42d2-409c-a8d2-d5b13a9150fd

https://www.spiegel.de/netzwelt/web/bundesbehoerde-warnt-vor-schwachstelle-in-weit-verbreiteter-software-a-55bc413b-2e01-446c-8ee6-5fabfee3b0f2

fachliche Quellen
https://www.heise.de/news/Kritische-Zero-Day-Luecke-in-log4j-gefaehrdet-zahlreiche-Server-und-Apps-6291653.html

https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2021/12/warnmeldung_cb-k21-1264.html?nn=520170

https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-549032-10F2.pdf?__blob=publicationFile&v=3

Apache Releases Log4j Version 2.15.0 to Address Critical RCE  
Vulnerability Under Exploitation | CISA


Java-Schwachstelle Log4Shell – Was passiert ist und was zu tun ist –  
Sophos News


Log4Shell explained – how it works, why you need to know, and how to  
fix it – Naked Security (sophos.com)



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] log4j cve

2021-12-15 Thread Ralf Prengel


Zitat von Ralf Prengel :




Tools

alle Links ohne Prüfung auf Inhalt und Qualität

https://log4shell.huntress.com/  (Quelle Sven Kuhnert)

https://therecord.media/log4j-zero-day-gets-security-fix-just-as-scans-for-vulnerable-systems-ramp-up/





Sorry,
cut & paste error.

Ralf

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OT:: Multiple PHP versions

2021-12-15 Thread Markus Falb
On Tue, 2021-12-14 at 19:18 -0800, Kenneth Porter wrote:
> 
> You might find that someone has packaged the version you desire in
> the 

Yes, but you have to think about it's maintainance status, be it a SCL
or packages in COPR or elsewhere. If it's unmaintained you might not
want to use it, especially if Software weaknesses might be exploited
remotely.

Regarding the php SCLs by RedHat (which were rebuilt by a CentOS Sig):
You will not get security updates for php < 7.3.

Best Regards, Markus

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] OT:: Multiple PHP versions

2021-12-15 Thread Matthew Miller
On Wed, Dec 15, 2021 at 02:31:20PM +0100, Markus Falb wrote:
> Yes, but you have to think about it's maintainance status, be it a SCL
> or packages in COPR or elsewhere. If it's unmaintained you might not
> want to use it, especially if Software weaknesses might be exploited
> remotely.

Take a look at Remi Collet's https://rpms.remirepo.net/. He is the
maintainer for the Fedora packages and the SCLs, and very passionate about
PHP. As I understand it, he is providing security updates for the 7.4 SCL
available from there through the end of next year (when upstream PHP drops
support).  



-- 
Matthew Miller

Fedora Project Leader
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Qemu - enabling "bridge mode" for primary physical interface for VMs

2021-12-15 Thread Chris Adams
Once upon a time, Lists  said:
> Thank you, I'll be trying this on a spare machine here before I try it in 
> production. Carefully reading the directions, although I see where bridge-br0 
> is created, I don't see where bridge-slave-em1 is defined? 

This part:

> > # Make a connection for the physical ethernet em1 to be part of the bridge
> > nmcli con add type ethernet ifname em1 master bridge-br0

does it.  If you don't specify a connection name, NM names a new bridge
member connection profile as "bridge-slave-".

-- 
Chris Adams 
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] network bound disk encryption bond interface not working

2021-12-15 Thread Natxo Asenjo
hi,

running 8.5 I cannot get to automatically unlock the luks container on a
dell poweredge 740.

This is the setup. The clevis client has bound a tang server:

# clevis luks list  -d /dev/sdb2
1: tang '{"url":"http://10.x.x.200"}'

This sdb2 is the boot device.

dracut config:

kernel_cmdline="bond=bond0:eno1,eno2:mode=4,miimon=100
ip=10.xx.x.1::10.xx.x.254:255.255.255.0::bond0:none  "
omit_dracutmodules+="ifcfg"

After a reboot, I see that the tang server receives a post from this ip,
and sends a 200 back:

16:45:02.247838 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto
TCP (6), length 60)
10.xx.x.200.80 > 10.xx.x.1.46374: Flags [S.], cksum 0x391b
(incorrect -> 0x0686), seq 2182485757, ack 3195393805, win 28960,
options [mss 1460,sackOK,TS val 329378980 ecr 3156670178,nop,wscale
7], length 0
16:45:02.248057 IP (tos 0x0, ttl 63, id 8950, offset 0, flags [DF],
proto TCP (6), length 52)
10.xx.x.1.46374 > 10.xx.x.200.80: Flags [.], cksum 0xa58d
(correct), ack 1, win 229, options [nop,nop,TS val 3156670178 ecr
329378980], length 0
16:45:02.248191 IP (tos 0x0, ttl 63, id 8951, offset 0, flags [DF],
proto TCP (6), length 448)
10.xx.xx.1.46374 > 10.xx.x.200.80: Flags [P.], cksum 0x134d
(correct), seq 1:397, ack 1, win 229, options [nop,nop,TS val
3156670178 ecr 329378980], length 396: HTTP, length: 396
POST /rec/BMZ0nj7Ecn79Au8t24041JoChXk HTTP/1.1
Host: 10.xx.x.200
User-Agent: curl/7.61.1
Accept: */*
Content-Type: application/jwk+json
Content-Length: 230


{"alg":"ECMR","crv":"P-521","kty":"EC","x":"ARUMMnBG_wm8o3KuHk9qnEPbft1M7SMSlHkFHiSD0dDZSegvIZARe8U1V6lsaYZGSJ8mPBvI-NlUUc4yrdF3naaz","y":"ANQwwFFAEzl6UWiDrv37Pr8yTuWdwlDwq_QR0Q9TNP34_fsJAZ-y3oJv0uIoat6KLhPylWTjAY_jJIblOzWhQZpW"}
16:45:02.248215 IP (tos 0x0, ttl 64, id 58644, offset 0, flags [DF],
proto TCP (6), length 52)
10.xxx.xx.200.80 > 10.xx.x.1.46374: Flags [.], cksum 0x3913
(incorrect -> 0xa3fb), ack 397, win 235, options [nop,nop,TS val
329378980 ecr 3156670178], length 0
16:45:02.282326 IP (tos 0x0, ttl 64, id 58645, offset 0, flags [DF],
proto TCP (6), length 69)
10.xx.x.200.80 > 10.x.x.1.46374: Flags [P.], cksum 0x3924
(incorrect -> 0xe3fa), seq 1:18, ack 397, win 235, options [nop,nop,TS
val 329379014 ecr 3156670178], length 17: HTTP, length: 17
HTTP/1.1 200 OK


So basically, it should unlock, but it's not unlocking.

Does anyone have experience with bond interfaces and nbde on 8/9?

TIA.

-- 
regards,
Natxo
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos