LWN.net Logo

Security

Filtering SCSI commands

By Jake Edge
January 30, 2013

SCSI command filtering has been the source of a number of Linux kernel problems over the years. In order to allow unprivileged users to have access to the commands needed for playing and burning CDs/DVDs, for example, the privilege requirement for sending SCSI commands was lowered. But that, in turn, caused problems where those unprivileged users could issue commands that were rather dangerous, including some that could destroy devices entirely. That led to a SCSI command whitelist being added to the 2.6.8 kernel, way back in 2004.

That whitelisting approach has itself proved problematic to the point where it was proposed for removal in 2006; that proposal failed due to strong opposition from Linus Torvalds. A privilege escalation vulnerability that was found in late 2011 is a more recent example where the filtering wasn't strict enough. Another hole has recently been discovered; Paolo Bonzini has posted a patch set to close the hole, while also addressing some other deficiencies in the SCSI command filtering.

The hole is CVE-2012-4542, which is caused by SCSI commands that overlap between device classes. The existing filter is set up to distinguish between devices opened for read-only and those opened for read-write. But in some cases the same command opcode will write to one kind of a device while it will read from some other type. For example, the READ SUB-CHANNEL (0x42) command for an MMC (CD or DVD) device is the same as the UNMAP command on a disk. So, using the command to request the sub-channel information for an audio CD would result in unmapping logical blocks if sent to a disk.

There are other examples cited in the bug report and patches, but the basic problem stems from the filtering not being aware of the destination device class. Without that information, it is not possible to be sure which opcodes are actually read-only and which will write to the device. The first part of Bonzini's patch set restructures the filter table to associate the device class and direction (read or write) with each command. He also changes blk_verify_command() to use the device class and new table.

Another chunk of the patch set adds more entries to the table both to add "rare & obsolete device types" and more whitelisted commands for existing device types.

The last piece of the set (beyond a minor cleanup) adds the ability to turn off the whitelist on a per-device basis. Currently, a process can be given the CAP_SYS_RAWIO capability, which will allow it to send any SCSI command to any device. But that makes for fairly coarse-grained control because it allows access to all devices. In addition, CAP_SYS_RAWIO may be used to elevate privileges, which may argue against its use.

Bonzini adds a new sysfs file, /sys/block/<device>/unpriv_sgio, if it is set to '1', the command filter will be bypassed for any file descriptor that is not read-only. This can be used to pass suitable file descriptors to trusted processes, as described in the patch:

This is useful for virtualization, where some trusted guests would like to send commands such as persistent reservations, but still the virtual machine monitor should run with restricted permissions.

Other than some fairly minor quibbles from Tejun Heo, there have been no comments on the patch set. Given that it fixes a CVE, it seems likely to be picked up fairly soon (even if the CVE number in the patch subject may get lost in translation to Torvalds's Git tree). The other pieces of the patch set are perhaps less important, but seem relatively uncontroversial.

Allowing non-root users to access hardware more or less directly is always problematic from a security standpoint. There is always tension, though, because users have strong ideas about how they want to use their systems. The history of the SCSI command whitelist shows that it is rather difficult to find the right balance between protecting the system and its hardware, and making a system that is usable—at least for some definitions of "usable".

Comments (none posted)

Brief items

Security quotes of the week

That's security in today's world. We have no choice but to trust Microsoft. Microsoft has reasons to be trustworthy, but they also have reasons to betray our trust in favor of other interests. And all we can do is ask them nicely to tell us first.
-- Bruce Schneier on the Open Letter to Skype

That said, recently made security "improvements" to Java SE 7 software don't prevent silent exploits at all. Users that require Java content in the web browser need to rely on a Click to Play technology implemented by several web browser vendors in order to mitigate the risk of a silent Java Plugin exploit.
-- Adam Gowdiak is unimpressed with recent Java security updates

Newegg refuses to settle in cases like this, even when it would be cheaper to settle than to fight. They beat the hell out of Soverain, killed their patent, and freed not just themselves, but all the firms that faced potential extortion from them -- and all of us, who will pay higher prices to keep these ticks nicely, comfortably bloated with their parasitic gains.
-- Cory Doctorow

We require that government agencies conducting criminal investigations use a search warrant to compel us to provide a user's search query information and private content stored in a Google Account—such as Gmail messages, documents, photos and YouTube videos. We believe a warrant is required by the Fourth Amendment to the U.S. Constitution, which prohibits unreasonable search and seizure and overrides conflicting provisions in ECPA [Electronic Communications Privacy Act].
-- Google

Comments (10 posted)

China, GitHub and the man-in-the-middle (Greatfire)

The Greatfire.org site has a detailed analysis of a man-in-the-middle attack apparently directed against Chinese Github users. "It’s clear that a lot of software developers in China rely on GitHub for their code sharing. Completely cutting access affects big business. GitHub may just be too important to block. That leaves the authorities in a real pickle. They can’t selectively block content on GitHub nor monitor what users are doing there. They also cannot block the website altogether lest they hurt important Chinese companies. This is where man-in-the-middle attacks make their entrance. By faking SSL certificates, the authorities can indeed intercept and track traffic to encrypted websites."

Comments (21 posted)

New vulnerabilities

corosync: denial of service

Package(s):corosync CVE #(s):
Created:January 30, 2013 Updated:January 30, 2013
Description: Corosync v2.3.0 fixes a potential denial of service, because HMAC was used without a key.
Alerts:
Fedora FEDORA-2013-1001 2013-01-30
Fedora FEDORA-2013-1083 2013-01-30

Comments (none posted)

cronie: file descriptor leak

Package(s):cronie CVE #(s):CVE-2012-6097
Created:January 29, 2013 Updated:April 5, 2013
Description: From the openSUSE advisory:

cron: does not close file descriptors before invocation of commands. See this bug report for more information.

Alerts:
openSUSE openSUSE-SU-2013:0205-1 2013-01-29
Mageia MGASA-2013-0023 2013-02-06
Mandriva MDVSA-2013:033 2013-04-05

Comments (none posted)

drupal: multiple vulnerabilities

Package(s):drupal7, drupal6 CVE #(s):
Created:January 28, 2013 Updated:March 6, 2013
Description: From the Red Hat bugzilla:

Drupal upstream has released 6.28 and 7.19 versions to correct multiple security issues. See the Drupal advisory for SA-CORE-2013-001.

Alerts:
Fedora FEDORA-2013-1169 2013-01-28
Fedora FEDORA-2013-1076 2013-01-28
Fedora FEDORA-2013-1092 2013-01-28
Fedora FEDORA-2013-1034 2013-01-28
Fedora FEDORA-2013-1039 2013-01-28
Fedora FEDORA-2013-1122 2013-01-28

Comments (none posted)

glance: information leak

Package(s):glance CVE #(s):CVE-2013-0212
Created:January 30, 2013 Updated:February 14, 2013
Description: From the Ubuntu advisory:

Dan Prince discovered an issue in Glance error reporting. An authenticated attacker could exploit this to expose the Glance operator's Swift credentials for a misconfigured or otherwise unusable Swift endpoint.

Alerts:
Ubuntu USN-1710-1 2013-01-29
Red Hat RHSA-2013:0209-01 2013-01-30
Fedora FEDORA-2013-1930 2013-02-14

Comments (none posted)

inkscape: unintended file access

Package(s):inkscape CVE #(s):CVE-2012-6076
Created:January 30, 2013 Updated:February 14, 2013
Description: From the Ubuntu advisory:

It was discovered that Inkscape attempted to open certain files from the /tmp directory instead of the current directory. A local attacker could trick a user into opening a different file than the one that was intended.

Alerts:
Ubuntu USN-1712-1 2013-01-30
openSUSE openSUSE-SU-2013:0294-1 2013-02-14
openSUSE openSUSE-SU-2013:0297-1 2013-02-15

Comments (none posted)

ipa: authentication bypass

Package(s):ipa CVE #(s):CVE-2012-5484
Created:January 24, 2013 Updated:February 25, 2013
Description:

From the Red Hat advisory:

A weakness was found in the way IPA clients communicated with IPA servers when initially attempting to join IPA domains. As there was no secure way to provide the IPA server's Certificate Authority (CA) certificate to the client during a join, the IPA client enrollment process was susceptible to man-in-the-middle attacks. This flaw could allow an attacker to obtain access to the IPA server using the credentials provided by an IPA client, including administrative access to the entire domain if the join was performed using an administrator's credentials. (CVE-2012-5484)

Note: This weakness was only exposed during the initial client join to the realm, because the IPA client did not yet have the CA certificate of the server. Once an IPA client has joined the realm and has obtained the CA certificate of the IPA server, all further communication is secure. If a client were using the OTP (one-time password) method to join to the realm, an attacker could only obtain unprivileged access to the server (enough to only join the realm).

Alerts:
Red Hat RHSA-2013:0188-01 2013-01-23
Red Hat RHSA-2013:0189-01 2013-01-23
CentOS CESA-2013:0189 2013-01-23
CentOS CESA-2013:0188 2013-01-24
Oracle ELSA-2013-0188 2013-01-23
Oracle ELSA-2013-0189 2013-01-24
Scientific Linux SL-ipa-20130124 2013-01-24
Scientific Linux SL-ipa--20130124 2013-01-24
Fedora FEDORA-2013-1445 2013-02-02
Fedora FEDORA-2013-2434 2013-02-23

Comments (none posted)

ircd-ratbox: denial of service

Package(s):ircd-ratbox CVE #(s):CVE-2012-6084
Created:January 25, 2013 Updated:February 11, 2013
Description:

From the Debian advisory:

It was discovered that a bug in the server capability negotiation code of ircd-ratbox could result in denial of service.

Alerts:
Debian DSA-2612-1 2013-01-24
Debian DSA-2612-2 2013-02-10

Comments (none posted)

libav: multiple vulnerabilities

Package(s):libav ffmpeg CVE #(s):CVE-2012-2783 CVE-2012-2791 CVE-2012-2797 CVE-2012-2803 CVE-2012-2804
Created:January 28, 2013 Updated:February 18, 2013
Description: From the CVE entries:

Unspecified vulnerability in libavcodec/vp56.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to "freeing the returned frame." (CVE-2012-2783)

Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11 have unknown impact and attack vectors, related to the "transform size." (CVE-2012-2791)

Unspecified vulnerability in the decode_frame_mp3on4 function in libavcodec/mpegaudiodec.c in FFmpeg before 0.11 has unknown impact and attack vectors related to a calculation that prevents a frame from being "large enough." (CVE-2012-2797)

Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to resetting the data size value. (CVE-2012-2803)

Unspecified vulnerability in libavcodec/indeo3.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to "reallocation code" and the luma height and width. (CVE-2012-2804)

Alerts:
Ubuntu USN-1705-1 2013-01-28
Ubuntu USN-1706-1 2013-01-28
Debian DSA-2624-1 2013-02-16

Comments (none posted)

libssh: denial of service

Package(s):libssh CVE #(s):CVE-2013-0176
Created:January 28, 2013 Updated:March 29, 2013
Description: From the Ubuntu advisory:

Yong Chuan Koh discovered that libssh incorrectly handled certain negotiation requests. A remote attacker could use this to cause libssh to crash, resulting in a denial of service.

Alerts:
Ubuntu USN-1707-1 2013-01-28
Fedora FEDORA-2013-1407 2013-02-02
Fedora FEDORA-2013-1422 2013-02-02
Mageia MGASA-2013-0033 2013-02-06
Mandriva MDVSA-2013:009 2013-02-09
Slackware SSA:2013-087-01 2013-03-28

Comments (none posted)

libvirt: code execution as root

Package(s):libvirt CVE #(s):CVE-2013-0170
Created:January 29, 2013 Updated:February 22, 2013
Description: From the Red Hat advisory:

A flaw was found in the way libvirtd handled connection cleanup (when a connection was being closed) under certain error conditions. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd or, potentially, execute arbitrary code with the privileges of the root user.

Alerts:
Red Hat RHSA-2013:0199-01 2013-01-28
Scientific Linux SL-libv-20130128 2013-01-28
CentOS CESA-2013:0199 2013-01-28
Oracle ELSA-2013-0199 2013-01-28
Ubuntu USN-1708-1 2013-01-29
Fedora FEDORA-2013-1644 2013-02-05
Fedora FEDORA-2013-1642 2013-02-08
Fedora FEDORA-2013-1626 2013-02-08
openSUSE openSUSE-SU-2013:0275-1 2013-02-12
openSUSE openSUSE-SU-2013:0274-1 2013-02-12
SUSE SUSE-SU-2013:0320-1 2013-02-21
Oracle ELSA-2013-0276 2013-02-28

Comments (none posted)

mingw-freetype: multiple vulnerabilities

Package(s):mingw-freetype CVE #(s):CVE-2012-1126 CVE-2012-1127 CVE-2012-1128 CVE-2012-1130 CVE-2012-1131 CVE-2012-1132 CVE-2012-1133 CVE-2012-1134 CVE-2012-1135 CVE-2012-1136 CVE-2012-1137 CVE-2012-1138 CVE-2012-1139 CVE-2012-1140 CVE-2012-1141 CVE-2012-1142 CVE-2012-1143 CVE-2012-1144
Created:January 28, 2013 Updated:January 30, 2013
Description: From the CVE entries:

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font. (CVE-2012-1126)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font. (CVE-2012-1127)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font. (CVE-2012-1128)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font. (CVE-2012-1130)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font. (CVE-2012-1131)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font. (CVE-2012-1132)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font. (CVE-2012-1133)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font. (CVE-2012-1134)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font. (CVE-2012-1135)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field. (CVE-2012-1136)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font. (CVE-2012-1137)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font. (CVE-2012-1138)

Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font. (CVE-2012-1139)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object. (CVE-2012-1140)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font. (CVE-2012-1141)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font. (CVE-2012-1142)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font. (CVE-2012-1143)

FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font. (CVE-2012-1144)

Alerts:
Fedora FEDORA-2013-1114 2013-01-28

Comments (none posted)

moodle: man-in-the-middle attack

Package(s):moodle CVE #(s):CVE-2012-6087
Created:January 28, 2013 Updated:April 3, 2013
Description: From the Red Hat bugzilla:

A security flaw was found in the way Moodle, a course management system (CMS), used (lib)cURL's CURLOPT_SSL_VERIFYHOST variable, when doing certificate validation (value of '1' meaning only check for the existence of a common name was used instead of value '2' - which also checks if the particular common name matches the requested hostname of the server). A rogue service could use this flaw to conduct man-in-the-middle (MiTM) attacks.

Alerts:
Fedora FEDORA-2013-0907 2013-01-28
Fedora FEDORA-2013-0968 2013-01-28
Fedora FEDORA-2013-0915 2013-01-28

Comments (none posted)

nova: access controls bypass

Package(s):nova CVE #(s):CVE-2013-0208
Created:January 30, 2013 Updated:February 10, 2013
Description: From the Ubuntu advisory:

Phil Day discovered that nova-volume did not validate access to volumes. An authenticated attacker could exploit this to bypass intended access controls and boot from arbitrary volumes.

Alerts:
Ubuntu USN-1709-1 2013-01-29
Red Hat RHSA-2013:0208-01 2013-01-30
Fedora FEDORA-2013-1816 2013-02-10

Comments (none posted)

perl: code execution

Package(s):perl CVE #(s):CVE-2012-6329
Created:January 25, 2013 Updated:February 19, 2013
Description:

From the Red Hat bugzilla entry:

A commit to the upstream perl git repository indicated that perl's Locale::Maketext was vulnerable to a flaw that could lead to arbitrary code execution of this function was executed on user-supplied input. Quoting the commit message:

Case 61251: This commit fixes a misparse of maketext strings that could lead to arbitrary code execution. Basically, maketext was compiling bracket notation into functions, but neglected to escape backslashes inside the content or die on fully-qualified method names when generating the code. This change escapes all such backslashes and dies when a method name with a colon or apostrophe is specified.

Alerts:
Fedora FEDORA-2013-0633 2013-01-24
Fedora FEDORA-2013-0659 2013-01-30
Mageia MGASA-2013-0032 2013-02-06
Fedora FEDORA-2013-1836 2013-02-19
SUSE SUSE-SU-2013:0441-1 2013-03-13
SUSE SUSE-SU-2013:0442-1 2013-03-13
openSUSE openSUSE-SU-2013:0497-1 2013-03-20
openSUSE openSUSE-SU-2013:0502-1 2013-03-20
Red Hat RHSA-2013:0685-01 2013-03-26
CentOS CESA-2013:0685 2013-03-26
CentOS CESA-2013:0685 2013-03-26
Oracle ELSA-2013-0685 2013-03-26
Oracle ELSA-2013-0685 2013-03-27
Scientific Linux SL-perl-20130327 2013-03-27

Comments (none posted)

php-symfony2-Yaml: code execution

Package(s):php-symfony2-Yaml CVE #(s):CVE-2013-1348 CVE-2013-1397
Created:January 28, 2013 Updated:February 4, 2013
Description: From the Symfony advisory:

When parsing an input with Yaml::parse(), and if the input is a valid filename, the input is evaluated as a PHP file before being parsed as YAML. If the input comes from an untrusted source, malicious code might be executed.

Symfony applications are not vulnerable to this attack but if you are parsing YAML with the YAML component in your application, check that your code does not pass untrusted input to Yaml::parse(). Note that Yaml\Parser::parse() is not affected. (CVE-2013-1348)

The Symfony YAML component supports PHP objects parsing and dumping (via the !!php/object: XXX notation).

When parsing an untrusted input that contains a serialized PHP object, it will be unserialized by default, which can lead to malicious code being executed.

Symfony applications are not vulnerable to this attack but if you are parsing YAML in your application, check that your code does not pass untrusted input to Yaml::parse() or Yaml\Parser::parse(). (CVE-2013-1397)

Alerts:
Fedora FEDORA-2013-1130 2013-01-28
Fedora FEDORA-2013-1167 2013-02-03
Fedora FEDORA-2013-0985 2013-02-03

Comments (none posted)

rubygem-activesupport: multiple vulnerabilities

Package(s):rubygem-activesupport CVE #(s):CVE-2013-0333
Created:January 29, 2013 Updated:February 10, 2013
Description: From the Red Hat advisory:

A flaw was found in the way Active Support performed the parsing of JSON requests by translating them to YAML. A remote attacker could use this flaw to execute arbitrary code with the privileges of a Ruby on Rails application, perform SQL injection attacks, or bypass the authentication using a specially-created JSON request.

Alerts:
Red Hat RHSA-2013:0202-01 2013-01-28
Debian DSA-2613-1 2013-01-30
Fedora FEDORA-2013-1745 2013-02-10
Fedora FEDORA-2013-1710 2013-02-10
openSUSE openSUSE-SU-2013:0278-1 2013-02-12
openSUSE openSUSE-SU-2013:0280-1 2013-02-12
SUSE SUSE-SU-2013:0486-1 2013-03-19
SUSE SUSE-SU-2013:0606-1 2013-04-03

Comments (none posted)

rubygem-multi_xml: code execution

Package(s):rubygem-multi_xml CVE #(s):CVE-2013-0175
Created:January 25, 2013 Updated:January 30, 2013
Description:

From the Red Hat bugzilla entry:

A security flaw was found in the way multi_xml gem, a Ruby gem to provide swappable XML backends utilizing LibXML, Nokogiri, Ox, or REXML, performed Symbol and YAML parameters parsing. A remote attacker could use this flaw to execute arbitrary code with the privileges of the Ruby on Rails application using the multi_xml gem via specially-crafted HTTP POST request.

Alerts:
Fedora FEDORA-2013-0808 2013-01-24
Fedora FEDORA-2013-0839 2013-01-25

Comments (none posted)

rubygem-rack: multiple vulnerabilities

Package(s):rubygem-rack CVE #(s):CVE-2012-6109 CVE-2013-0183 CVE-2013-0184
Created:January 28, 2013 Updated:March 15, 2013
Description: From the Red Hat bugzilla [1], [2], [3]:

[1] Upstream released Rack 1.4.2, 1.3.7, 1.2.6, and 1.1.4 to fix a denial of service condition when Rack parses content with a certain Content-Disposition header as noted in the original report. (CVE-2012-6109)

[2] Upstream released [1] Rack 1.4.3 and 1.3.8 to fix a denial of service condition due to a malicious client sending excessively long lines that trigger an out-of-memory error in Rack. (CVE-2013-0183)

[3] A flaw that was fixed in 1.4.4, 1.3.9, 1.2.7, and 1.1.5 was also announced that creates a minor denial of service condition, this time in the Rack::Auth::AbstractRequest, where it symbolized arbitrary strings (apparently this has something to do with authentication, but there is no further information provided other than the fix itself, which is noted as "a breaking API change"). (CVE-2013-0184)

Alerts:
Fedora FEDORA-2013-0837 2013-01-25
Fedora FEDORA-2013-0861 2013-01-25
Fedora FEDORA-2013-0896 2013-01-25
openSUSE openSUSE-SU-2013:0338-1 2013-02-25
openSUSE openSUSE-SU-2013:0462-1 2013-03-14
SUSE SUSE-SU-2013:0508-1 2013-03-20

Comments (none posted)

samba4: privilege escalation

Package(s):samba4 CVE #(s):CVE-2013-0172
Created:January 25, 2013 Updated:February 5, 2013
Description:

From the Red Hat bugzilla entry:

Samba 4.0 as an AD DC may provide authenticated users with write access to LDAP directory objects.

In AD, Access Control Entries can be assigned based on the objectClass of the object. If a user or a group the user is a member of has any access based on the objectClass, then that user has write access to that object.

Additionally, if a user has write access to any attribute on the object, they may have access to write to all attributes.

Alerts:
Fedora FEDORA-2013-0859 2013-01-24
Fedora FEDORA-2013-0935 2013-02-05

Comments (none posted)

zabbix: LDAP authentication override

Package(s):zabbix CVE #(s):CVE-2013-1364
Created:January 28, 2013 Updated:January 30, 2013
Description: From the Red Hat bugzilla:

It was reported that the user.login method in Zabbix would accept a 'cnf' parameter containing the configuration parameters to use for LDAP authentication, which would override the configuration stored in the database. This can be used to authenticate to Zabbix using a completely different LDAP application (e.g. authenticate to Zabbix using some other LDAP directory the attacker has credentials for).

This has been corrected in upstream versions 2.1.0 r32446, 2.0.5rc1 r32444 and 1.8.16rc1 r32442.

Alerts:
Fedora FEDORA-2013-1082 2013-01-28
Fedora FEDORA-2013-1002 2013-01-28

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds