| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ❌ |
If you discover a security vulnerability in Ultimate Linux Suite, please report it responsibly:
- Do not open a public issue
- Email the maintainers directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We aim to respond within 48 hours and will work with you to understand and address the issue.
The queue system is designed with security in mind:
- No arbitrary command execution: The dangerous
queue_commandfunction is disabled - Type whitelist: Only allowed queue types are processed:
pkg_install/pkg_removesysctl(with key whitelist)service(with action whitelist)file_write(with path restrictions)
All user inputs are validated:
- Package names: Alphanumeric with dots, dashes, underscores, plus signs (max 128 chars)
- Sysctl keys: Must match hardcoded whitelist
- Service names: Alphanumeric with dashes, underscores, dots, @ symbols
- Service actions: Only
start,stop,restart,reload,enable,disable - File paths: Restricted to specific directories (e.g.,
/etc/sysctl.d/)
Only these kernel parameters can be modified:
vm.swappiness
vm.vfs_cache_pressure
vm.dirty_ratio
vm.dirty_background_ratio
vm.dirty_expire_centisecs
vm.dirty_writeback_centisecs
vm.laptop_mode
fs.file-max
net.ipv4.tcp_congestion_control
net.core.default_qdisc
net.ipv6.conf.all.disable_ipv6
net.ipv6.conf.default.disable_ipv6
net.core.rmem_max
net.core.wmem_max
net.core.somaxconn
net.core.netdev_max_backlog
net.ipv4.tcp_rmem
net.ipv4.tcp_wmem
net.ipv4.tcp_max_syn_backlog
kernel.nmi_watchdog
- Queue file: Created with mode 600 (owner read/write only)
- Queue directory: Created with mode 700
- Log files: Created with appropriate user permissions
System operations use validated helper functions:
_safe_enable_zram(): Validates size range (1MB-64GB)_safe_set_thp(): Validates mode (always/madvise/never)_safe_set_cpu_governor(): Validates against available governors_safe_gsettings(): Validates schema and key format
- Review the queue before executing operations
- Run with least privilege when possible (some features require root)
- Keep the suite updated to get security fixes
- Don't modify the validation whitelists unless you understand the implications
- Check logs after operations for any anomalies
For production/server use:
# Run syntax check before use
make test
# Review all queued operations
./ultimate.sh
# -> Queue Management -> Preview queue
# Check log files
cat ~/.ultimate-linux-suite/logs/suite-*.log- The suite requires root/sudo for most system modifications
- Some operations cannot be fully sandboxed (e.g., package installation)
- External package repositories are trusted as-is
- Removed dangerous
evalcommand execution - Added comprehensive input validation
- Implemented sysctl key whitelist
- Added service action whitelist
- Restricted file write paths
- Fixed word splitting vulnerabilities
- Added safe execution helpers