False CVE on BackBox 4.6 unmasked

A member of BackBox community brought to our attention the existence of CVE-2017-7397 asking if it were an actual vulnerability.

Short answer: No, it’s not.

Long answer: Here follows our analysis.

We started by taking a look at CVE requirements for new CVE submissions (http://cve.mitre.org/cve/request_id.html).

BackBox Linux 4.7 released!

The BackBox Team is pleased to announce the updated release of BackBox Linux, the version 4.7.

We thought to release a new minor version to give our users the opportunity to have a stable and up-to-date sytem till the next official major release, i.e. BackBox 5, stilll under development.

In this release we have fixed some minor bugs, updated the kernel stack, base system and tools.

The ISO images for 32bit & 64bit can be downloaded from the official web site download section:

http://www.backbox.org/download

BackBox 4 kernel stack up to date

Ubuntu systems already have LTS enablement stacks that provide newer kernel and X support for existing Ubuntu LTS releases. As we all know, BackBox core system is built on Ubuntu system and therefore the same principle can be applied.

For those who are impatient and want to upgrade the kernel stack with their current BackBox 4.x to the latest available, you can follow the instructions below:

$ sudo apt-get install --install-recommends linux-generic-lts-xenial xserver-xorg-core-lts-xenial xserver-xorg-lts-xenial xserver-xorg-video-all-lts-xenial xserver-xorg-input-all-lts-xenial libwayland-egl1-mesa-lts-xenial

And we are all good just like that!

The full description for Ubuntu systems can be found at https://wiki.ubuntu.com/Kernel/LTSEnablementStack (Ubuntu 14.04 LTS - Trusty Tahr)
If any issues occur, feel free to get in touch with BackBox Community where you will have support.

Pages

Subscribe to RSS - blogs