|
|
Subscribe / Log in / New account

Security

Cascading security updates

By Jake Edge
February 27, 2008

When following the distributions' security updates on a daily basis, as we do at LWN, certain days are more work than others. Two weeks ago we had a rather full update with no less than 28 packages updated for Fedora (most of those for both F7 and F8), along with a handful of updates from other distributions. It turns out that the majority of the Fedora updates had a single cause: a set of serious vulnerabilities in Mozilla Firefox.

How does a single update to an application ripple so far that more than a dozen packages have to be rebuilt? One would think there would be shared libraries that would get updated, with applications picking up those changes the next time they are run. That is, in theory, how things are supposed to work, but in this case, the underlying libraries have no fixed application binary interface (ABI). So, changes to those libraries require any applications that use them to be rebuilt and retested.

Gecko is the rendering engine used by Mozilla in their products to display HTML. Various other packages have started using it as well because of its speed and standards compliance. Because Mozilla sometimes breaks the ABI between releases, even minor releases, distributions may be stuck rebuilding those applications when a new version of the library is released. Normally, that only happens when packaging a new version of the distribution—or when serious security flaws are found.

Mozilla's solution for this problem is XULRunner which will provide a stable ABI for applications. As XULRunner and its companion libxul become more widely available, the applications that currently link to the Gecko libraries will presumably switch to avoid these kinds of problems in the future. It is highly unlikely that we have seen the last security problem in the Gecko engine, so reducing the cascade that results from finding one would be welcome.

Because of problems with the ABI changing in the past, Fedora chooses to make the applications' library version number exactly track the Mozilla release number. Some other distributions do not do that, so unless the ABI does change, they do not need to update each package that uses the libraries. This has some advantages, but could lead to broken applications if an ABI change goes unnoticed.

We have also seen similar cascades of updates, most notably from the xpdf PDF viewer. Unlike Gecko, there is no library for xpdf, leading multiple applications to include its source into their own. When a flaw is found, several different applications (cups, gpdf, etc.) across all distributions need to be updated immediately, leading to a similar effect as was seen with the Gecko vulnerabilities. Hopefully, over time, the development of the poppler library will mitigate this problem somewhat.

There are lots of good reasons to separate code into components where possible, but security is an important one. Creating and maintaining an ABI is sometimes difficult, but generally worth the trouble. Imagine the chaos that could result from a security vulnerability requiring an ABI change in glibc.

Comments (9 posted)

Brief items

Cold Reboot Attacks on Disk Encryption

Ed Felten's Freedom to Tinker weblog has a report on research he and his colleagues have done on subverting whole disk encryption by reading the keys from RAM after the machine has been power-cycled. "The root of the problem lies in an unexpected property of today’s DRAM memories. DRAMs are the main memory chips used to store data while the system is running. Virtually everybody, including experts, will tell you that DRAM contents are lost when you turn off the power. But this isn't so. Our research shows that data in DRAM actually fades out gradually over a period of seconds to minutes, enabling an attacker to read the full contents of memory by cutting power and then rebooting into a malicious operating system."

Comments (38 posted)

Security reports

Risk report: Three years of Red Hat Enterprise Linux 4

Red Hat has published an updated version of its risk report for RHEL4, summarizing the security vulnerabilities in that distribution for the last three years and how Red Hat responded to them. "Fixes for 81% of critical flaws were available from Red Hat Network at latest one calendar day after public disclosure of the flaw. 63% of the critical flaws were fixed on the very same day. This fast response time is a deliberate goal of the Red Hat Security Response Team and forms an essential part of reducing customer risk from critical flaws." It would be nice if all distributors would produce an occasional report like this.

Comments (18 posted)

New vulnerabilities

acroread: multiple vulnerabilities

Package(s):acroread CVE #(s):CVE-2007-5659 CVE-2007-5663 CVE-2007-5666 CVE-2007-0044
Created:February 22, 2008 Updated:March 3, 2008
Description: Several flaws were found in the way Adobe Reader processed malformed PDF files. An attacker could create a malicious PDF file which could execute arbitrary code if opened by a victim. A flaw was found in the way the Adobe Reader browser plug-in honored certain requests. A malicious PDF file could cause the browser to request an unauthorized URL, allowing for a cross-site request forgery attack.
Alerts:
Gentoo 200803-01:04 acroread 2008-03-02
Red Hat RHSA-2008:0144-01 acroread 2008-02-22

Comments (none posted)

asterisk: multiple vulnerabilities

Package(s):asterisk CVE #(s):CVE-2007-3762 CVE-2007-3763 CVE-2007-3764 CVE-2007-4103
Created:February 27, 2008 Updated:February 27, 2008
Description: Asterisk suffers from a protocol handling error, a buffer overflow, and a NULL pointer dereferencing bug in the IAX2 channel driver, and a memory overflow in the Skinny channel driver.
Alerts:
SuSE SUSE-SR:2007:015 PHP, moodle, tomcat5, lighttpd, asterisk, libarchive, xpdf, evolution, kvirc, wireshark, gd, opera, clamav, gimp 2007-08-03
Debian DSA-1358-1 asterisk 2007-08-26
Gentoo 200802-11 asterisk 2008-02-26

Comments (none posted)

clamav: heap corruption

Package(s):clamav CVE #(s):CVE-2008-0728
Created:February 22, 2008 Updated:April 18, 2008
Description: From the CVE entry: libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."
Alerts:
Mandriva MDVSA-2008:088 clamav 2007-04-17
Gentoo 200802-09 clamav 2008-02-21
SuSE SUSE-SR:2008:004 xdg-utils, clamav, wireshark, pcre 2008-02-22

Comments (none posted)

cups: denial of service

Package(s):cups CVE #(s):CVE-2008-0886
Created:February 27, 2008 Updated:February 27, 2008
Description: From the Mandriva advisory: A flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.
Alerts:
Mandriva MDVSA-2008:050 cups 2008-02-26
Mandriva MDVSA-2008:051 cups 2007-02-26

Comments (none posted)

cups: denial of service

Package(s):cups CVE #(s):CVE-2008-0882
Created:February 22, 2008 Updated:April 3, 2008
Description: From the Red Hat advisory: A flaw was found in the way CUPS handles the addition and removal of remote shared printers via IPP. A remote attacker could send malicious UDP IPP packets causing the CUPS daemon to crash.
Alerts:
Ubuntu USN-598-1 cupsys 2008-04-02
Gentoo 200804-01 cups 2008-04-01
Debian DSA-1530-1 cupsys 2008-03-25
Mandriva MDVSA-2008:050 cups 2008-02-26
Fedora FEDORA-2008-1976 cups 2008-02-25
Fedora FEDORA-2008-1901 cups 2008-02-25
SuSE SUSE-SA:2008:012 cups 2008-03-06
Red Hat RHSA-2008:0157-01 cups 2008-02-21

Comments (none posted)

cups: multiple vulnerabilities

Package(s):cups CVE #(s):CVE-2008-0596 CVE-2008-0597
Created:February 25, 2008 Updated:March 6, 2008
Description:

From the Red Hat advisory:

A flaw was found in the way CUPS handled the addition and removal of remote shared printers via IPP. A remote attacker could send malicious UDP IPP packets causing the CUPS daemon to attempt to dereference already freed memory and crash. (CVE-2008-0597)

A memory management flaw was found in the way CUPS handled the addition and removal of remote shared printers via IPP. When shared printer was removed, allocated memory was not properly freed, leading to a memory leak possibly causing CUPS daemon crash after exhausting available memory. (CVE-2008-0596)

These issues were found during the investigation of CVE-2008-0882.

Alerts:
Mandriva MDVSA-2008:050 cups 2008-02-26
SuSE SUSE-SA:2008:012 cups 2008-03-06
rPath rPSA-2008-0091-1 cups 2008-02-29
Red Hat RHSA-2008:0161-01 cups 2008-02-25
Red Hat RHSA-2008:0153-01 cups 2008-02-25

Comments (none posted)

diatheke: insufficient input sanitizing

Package(s):diatheke CVE #(s):CVE-2008-0932
Created:February 26, 2008 Updated:March 4, 2008
Description: From the Debian advisory: Dan Dennison discovered that Diatheke, a CGI program to make a bible website, performs insufficient sanitizing of a parameter, allowing a remote attacker to execute arbitrary shell commands as the web server user.
Alerts:
Fedora FEDORA-2008-1922 sword 2008-02-25
Debian DSA-1508-1 diatheke 2008-02-25
Gentoo 200803-06 sword 2008-03-03
Fedora FEDORA-2008-1951 sword 2008-02-25

Comments (none posted)

dnssec-tools: insufficient validation

Package(s):dnssec-tools CVE #(s):
Created:February 26, 2008 Updated:February 27, 2008
Description: DNSSEC-Tools 1.3.2 contains several fixes, including a patch to the libval DNSSEC validation library to ensure that the signature that validates it is a signature of the trust anchor itself.
Alerts:
Fedora FEDORA-2008-1771 dnssec-tools 2008-02-25
Fedora FEDORA-2008-1758 dnssec-tools 2008-02-25

Comments (none posted)

dspam: insecure password

Package(s):dspam CVE #(s):CVE-2007-6418
Created:February 22, 2008 Updated:February 27, 2008
Description: From the Debian advisory: Tobias Gruetzmacher discovered that a Debian-provided CRON script in dspam, a statistical spam filter, included a database password on the command line when using the MySQL backend. This allowed a local attacker to read the contents of the dspam database, such as emails.
Alerts:
Debian DSA-1501-1 dspam 2008-02-21

Comments (none posted)

ghostscript: buffer overflow

Package(s):ghostscript gs CVE #(s):CVE-2008-0411
Created:February 27, 2008 Updated:April 10, 2008
Description: The Ghostscript color-space handling code suffers from a buffer overflow which may be exploitable by way of a specially-crafted postscript file.
Alerts:
Ubuntu USN-599-1 ghostscript, gs-esp, gs-gpl 2008-04-09
Fedora FEDORA-2008-2084 ghostscript 2008-03-06
rPath rPSA-2008-0082-1 espgs 2008-02-28
Debian DSA-1510-1 gs-esp 2008-02-27
Gentoo 200803-14 ghostscript-gpl 2008-03-08
Slackware SSA:2008-062-01 ghostscript 2008-03-03
Mandriva MDVSA-2008:055 ghostscript 2007-02-28
Red Hat RHSA-2008:0155-01 ghostscript 2008-02-27
Fedora FEDORA-2008-1998 ghostscript 2008-03-03
SuSE SUSE-SA:2008:010 ghostscript 2008-02-28
Debian DSA-1510-1 gs-esp 2008-02-27

Comments (none posted)

kernel: arbitrary code execution

Package(s):kernel-source-2.4.27 CVE #(s):CVE-2004-2731
Created:February 25, 2008 Updated:March 6, 2008
Description:

From the Debian advisory:

CVE-2004-2731: infamous41md reported multiple integer overflows in the Sbus PROM driver that would allow for a DoS (Denial of Service) attack by a local user, and possibly the execution of arbitrary code.

Alerts:
Debian DSA-1503-2 kernel-source-2.4.27 2008-03-06
Debian DSA-1503 kernel-source-2.4.27 2008-02-22

Comments (none posted)

kernel: memory corruption

Package(s):kernel-source-2.4.27 CVE #(s):CVE-2006-5753
Created:February 25, 2008 Updated:March 6, 2008
Description:

From the Debian advisory:

CVE-2006-5753: Eric Sandeen provided a fix for a local memory corruption vulnerability resulting from a misinterpretation of return values when operating on inodes which have been marked bad.

Alerts:
Debian DSA-1503 kernel-source-2.4.27 2008-02-22
Debian DSA-1503-2 kernel-source-2.4.27 2008-03-06

Comments (none posted)

kernel: denial of service

Package(s):kernel-source-2.4.27 CVE #(s):CVE-2006-6053
Created:February 25, 2008 Updated:March 6, 2008
Description:

From the Debian advisory:

CVE-2006-6053: LMH reported a potential local DoS which could be exploited by a malicious user with the privileges to mount and read a corrupted ext3 filesystem.

Alerts:
Debian DSA-1503 kernel-source-2.4.27 2008-02-22
Debian DSA-1503-2 kernel-source-2.4.27 2008-03-06

Comments (none posted)

kernel: denial of service

Package(s):kernel-source-2.4.27 CVE #(s):CVE-2007-2525
Created:February 25, 2008 Updated:March 6, 2008
Description:

From the Debian advisory:

CVE-2007-2525: Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused by releasing a socket before PPPIOCGCHAN is called upon it. This could be used by a local user to DoS a system by consuming all available memory.

Alerts:
Debian DSA-1504 kernel-source-2.6.8 2008-02-22
Debian DSA-1503-2 kernel-source-2.4.27 2008-03-06
Debian DSA-1503 kernel-source-2.4.27 2008-02-22

Comments (none posted)

kernel: reduction in random entropy

Package(s):kernel-source-2.4.27 CVE #(s):CVE-2007-4311
Created:February 25, 2008 Updated:March 6, 2008
Description:

From the Debian advisory:

CVE-2007-4311: PaX team discovered an issue in the random driver where a defect in the reseeding code leads to a reduction in entropy.

Alerts:
Debian DSA-1503 kernel-source-2.4.27 2008-02-22
Debian DSA-1503-2 kernel-source-2.4.27 2008-03-06

Comments (none posted)

kernel: denial of service

Package(s):kernel-source-2.6.8 CVE #(s):CVE-2006-7203
Created:February 25, 2008 Updated:February 27, 2008
Description:

From the Debian advisory:

CVE-2006-7203: OpenVZ Linux kernel team reported an issue in the smbfs filesystem which can be exploited by local users to cause a DoS (oops) during mount.

Alerts:
Debian DSA-1504 kernel-source-2.6.8 2008-02-22

Comments (none posted)

moin: multiple XSS vulnerabilities

Package(s):moin CVE #(s):CVE-2008-0780 CVE-2008-0781
Created:February 21, 2008 Updated:June 18, 2009
Description: moin has cross site scripting vulnerabilities in the login action and the AttachFile action.
Alerts:
Fedora FEDORA-2009-6557 moin 2009-06-18
Fedora FEDORA-2009-6559 moin 2009-06-18
Fedora FEDORA-2009-3868 moin 2009-04-21
Fedora FEDORA-2009-3845 moin 2009-04-21
Ubuntu USN-716-1 moin 2009-01-30
Gentoo 200803-27 moinmoin 2008-03-18
Debian DSA-1514-1 moin 2008-03-09
Fedora FEDORA-2008-1880 moin 2008-02-21
Fedora FEDORA-2008-1905 moin 2008-02-21

Comments (none posted)

qemu: unchecked block read/write

Package(s):qemu kvm CVE #(s):
Created:February 26, 2008 Updated:February 27, 2008
Description: From this post to the Debian security list: "I think I have discovered a vulnerability in qemu. It is related to the block device drivers: that is, the backends which implement the functionality offered to a guest via emulated block devices such as the emulated IDE controller."
Alerts:
Fedora FEDORA-2008-1993 kvm 2008-02-25
Fedora FEDORA-2008-1995 qemu 2008-02-25
Fedora FEDORA-2008-2001 qemu 2008-02-25
Fedora FEDORA-2008-1973 kvm 2008-02-25

Comments (none posted)

splitvt: privilege escalation

Package(s):splitvt CVE #(s):CVE-2008-0162
Created:February 22, 2008 Updated:March 4, 2008
Description: From the Debian advisory: Mike Ashton discovered that splitvt, a utility to run two programs in a split screen, did not drop group privileges prior to executing 'xprop'. This could allow any local user to gain the privileges of group utmp.
Alerts:
Gentoo 200803-05 splitvt 2008-03-03
Debian DSA-1500-1 splitvt 2008-02-21

Comments (none posted)

turba2: access violation

Package(s):turba2 CVE #(s):CVE-2008-0807
Created:February 25, 2008 Updated:February 29, 2008
Description:

From the Debian advisory:

Peter Paul Elfferich discovered that turba2, a contact management component for horde framework did not correctly check access rights before allowing users to edit addresses. This could result in valid users being able to alter private address records.

Alerts:
Fedora FEDORA-2008-2087 imp 2008-02-28
Fedora FEDORA-2008-2040 imp 2008-02-28
Debian DSA-1507-1 turba2 2008-02-24
Fedora FEDORA-2008-2040 horde 2008-02-28
Fedora FEDORA-2008-2087 turba 2008-02-28
Fedora FEDORA-2008-2040 turba 2008-02-28
Fedora FEDORA-2008-2087 horde 2008-02-28

Comments (none posted)

wordpress: multiple vulnerabilities

Package(s):wordpress CVE #(s):CVE-2007-3238 CVE-2007-2821 CVE-2008-0193 CVE-2008-0194
Created:February 22, 2008 Updated:February 27, 2008
Description: From the Debian advisory:

Cross-site scripting (XSS) vulnerability in functions.php in the default theme in WordPress allows remote authenticated administrators to inject arbitrary web script or HTML via the PATH_INFO (REQUEST_URI) to wp-admin/themes.php. (CVE-2007-3238)

SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress before 2.2 allows remote attackers to execute arbitrary SQL commands via the cookie parameter. (CVE-2007-2821)

Cross-site scripting (XSS) vulnerability in wp-db-backup.php in WordPress 2.0.11 and earlier allows remote attackers to inject arbitrary web script or HTML via the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. (CVE-2008-0193)

Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. (CVE-2008-0194)

Alerts:
Debian DSA-1502-1 wordpress 2008-02-22

Comments (none posted)

wyrd: insecure temporary file

Package(s):wyrd CVE #(s):CVE-2008-0806
Created:February 26, 2008 Updated:February 27, 2008
Description: wyrd 1.4.3b allows local users to overwrite arbitrary files via a symlink attack on the wyrd-tmp.[USERID] temporary file.
Alerts:
Fedora FEDORA-2008-1963 wyrd 2008-02-25
Fedora FEDORA-2008-1986 wyrd 2008-02-25

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2008, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds