LINUX LITE 7.2 FINAL RELEASED - SEE RELEASE ANNOUNCEMENTS SECTION FOR DETAILS


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Image magic Malware on 3.4
#11
Hello,
glad you happy and feeling comfortable in knowing your system is patched. Smile
Issues on Linux get patched much quicker than Windows, with update regularly.
Generally at computer, to make a small routine, basic checks like above.
Do Systemback backup and ISO backup before is any kind of problem, such as hardware issues.
Do data back up often add any new files copy/paste it to portable hdd or usb stick.
Not to use usb you found, not to loan it.

The advanced users will know more efficient checks and detailed than I do.

If there is malware designed for Linux mostly it will not run at Windows7, and those huge numbers of Windows malware, virus mostly wont affect Linux.
I don't know if maybe some it can be multi-platform.

If you happy now with the update patch, can you click modify and choose SOLVED please.
Reply
#12
This particular bug is just that. A bug. It was discovered largely because of the other software involved. There is not any malware in the other software just a Debian system vulnerability to the other software whereby malware could be written to control the desktop GUI (denial of service vulnerability) If you are upadated via the Lite updater I'm sure you are fine. It was discovered precisely in the way you discovered it, loss of GUI control. The vulnerabitily was patched in less than week. It was never malware, just a potential vulnerability that allowed for the possibility of a denial of service hack.

TC
All opinions expressed and all advice given by Trinidad Cruz on this forum are his responsibility alone and do not necessarily reflect the views or methods of the developers of Linux Lite. He is a citizen of the United States where it is acceptable to occasionally be uninformed and inept as long as you pay your taxes.
Reply
#13
I have been using LL for a couple of years and until then never had any issues. What is still puzzling is the fact I distinctly remember doing an update before i plugged in the drive. I am still reluctant to plug in this drive but don't want to lose data either. There may be files on there I don't have on DVD. Don't know what to do with this drive. My system is patched but afraid to plug in the infected drive. Maybe have a someone with a WIN machine to scan the disk? Need to keep a close eye on that computer and not plug drives into unknown environments like Windows networks :0 Meanwhile keep building more computers with linux.

Thank you,
Shannon


(07-31-2017, 01:41 PM)trinidad link Wrote: This particular bug is just that. A bug. It was discovered largely because of the other software involved. There is not any malware in the other software just a Debian system vulnerability to the other software whereby malware could be written to control the desktop GUI (denial of service vulnerability) If you are upadated via the Lite updater I'm sure you are fine. It was discovered precisely in the way you discovered it, loss of GUI control. The vulnerabitily was patched in less than week. It was never malware, just a potential vulnerability that allowed for the possibility of a denial of service hack.

TC
Linux enthusiasts don't care about the lame stream.
Reply
#14
Computer is patched but what about this infected drive I need to recover data from?

Thanks,
Shannon


(07-31-2017, 12:10 PM)bitsnpcs link Wrote: Hello,
glad you happy and feeling comfortable in knowing your system is patched. Smile
Issues on Linux get patched much quicker than Windows, with update regularly.
Generally at computer, to make a small routine, basic checks like above.
Do Systemback backup and ISO backup before is any kind of problem, such as hardware issues.
Do data back up often add any new files copy/paste it to portable hdd or usb stick.
Not to use usb you found, not to loan it.

The advanced users will know more efficient checks and detailed than I do.

If there is malware designed for Linux mostly it will not run at Windows7, and those huge numbers of Windows malware, virus mostly wont affect Linux.
I don't know if maybe some it can be multi-platform.

If you happy now with the update patch, can you click modify and choose SOLVED please.
Linux enthusiasts don't care about the lame stream.
Reply
#15
(07-31-2017, 08:29 PM)Redchief link Wrote: Computer is patched but what about this infected drive I need to recover data from?
Thanks,
Shannon

I am unsure how to do it. It is likely you can use a "sandbox" to open the usb stick in and inspect the files.

Update -
It has some methods how to here -  https://security.stackexchange.com/quest...key-safely

Reply
#16
Have look into further.

Thanks,
(07-31-2017, 10:20 PM)bitsnpcs link Wrote: [quote author=Redchief link=topic=4464.msg33994#msg33994 date=1501532981]
Computer is patched but what about this infected drive I need to recover data from?
Thanks,
Shannon

I am unsure how to do it. It is likely you can use a "sandbox" to open the usb stick in and inspect the files.

Update -
It has some methods how to here -  https://security.stackexchange.com/quest...key-safely
[/quote]
Linux enthusiasts don't care about the lame stream.
Reply
#17
Hope it is help you solve that. Smile
Reply
#18
The bug was about dirty video files. If the system vulnerability is patched the USB that caused the DOS should not be able to cause it again. Video files often have UI controls written into them. This is technically not malware, but something that has the potential to be malware. You should be fine to run the USB again. Save your session before you do, and don't sudo to use the USB. There is a chance that the USB will no longer work for you too.

TC
All opinions expressed and all advice given by Trinidad Cruz on this forum are his responsibility alone and do not necessarily reflect the views or methods of the developers of Linux Lite. He is a citizen of the United States where it is acceptable to occasionally be uninformed and inept as long as you pay your taxes.
Reply


Forum Jump:


Users browsing this thread: 3 Guest(s)