|
|
Log in / Subscribe / Register

Security

Fedora and CAPP

By Jake Edge
December 10, 2008

Removing the ability for regular users to execute "system" programs has a certain appeal, but does it really provide any extra security? A thread on the fedora-devel mailing list explores that question in the context of usermod (and other, similar tools), which had their permissions changed more than two years ago in an effort to meet security certification requirements. Whether these changes, and at some level the certifications themselves, actually increase the security of the system is the open question.

Callum Lerwick noticed that running usermod no longer worked as a regular user. He has a habit of doing that to get a quick overview of the command syntax and options from the help page, but unless he uses sudo, that doesn't work. That was done on purpose as Steve Grubb describes:

These should have been gone for quite a while...and on purpose. You cannot do anything with them unless you are root. Allowing anyone even to execute them would require lots of bad things for our LSPP/CAPP evaluations.

LSPP and CAPP are two protection profiles that are used for Common Criteria security certifications (such as EAL3) that Red Hat Enterprise Linux (RHEL) has earned. Because these tools can modify trusted databases (e.g. /etc/shadow), attempts to run them by untrusted users must be added to the audit log in order to comply with the certifications. But adding audit events requires the CAP_AUDIT_WRITE capability bit; in today's systems that effectively means setuid(0). As Grubb puts it: "IOW, if we open the permissions, we need to make these become setuid root so that we send audit events saying they failed."

Leaving aside the idea that only processes with root permissions are allowed to generate auditable events—which seems a bit bizarre—there is still the question of how much protection is provided by changing the file permissions. Seth Vidal asks:

And do we seriously think we can keep the code away from a non-root user by chmodd'ing the binaries? A user can get a binary for anything fedora can install in about 30s w/firefox.

Allowing users to download binaries "takes the system out of the certified configuration", according to Grubb, "So, if you need to be in the CAPP certified configuration, don't let users do this." This fairly clearly demonstrates the dubious nature of the security afforded by the current certifications. For the most part, the protection profiles define away nearly all of the interesting threats that most systems face today.

To a large extent, CAPP/LSPP certifications are the kinds of things listed in marketing materials for "enterprise" operating systems rather than serious attempts to address the real security needs of the vast majority of network connected systems. Grubb provides an excellent overview of some of the requirements of CAPP, along with how they are implemented in Fedora as part of the discussion. The CAPP information page gives the full story, however:

The CAPP provides for a level of protection, which is appropriate for an assumed non-hostile and well-managed user community requiring protection against threats of inadvertent or casual attempts to breach the system security. The profile is not intended to be applicable to circumstances in which protection is required against determined attempts by hostile and well-funded attackers to breach system security.

But CAPP does require that all attempts to modify trusted databases like the shadow password file generate an audit trail, so there is a lower-level audit rule set up for that file. Any access to /etc/shadow, for example, is logged as Grubb describes in his overview. That, though, begs other questions as Lerwick points out:

So we *are* auditing low level filesystem calls? So then what, other than security theater, does auditing execution of usermod gain us?

The answer is that auditing execution of usermod by non-root users gains exactly one thing: CAPP compliance. It requires that binaries which modify trusted databases leave an audit trail. Even though any actual attempt to access the underlying file will be logged, just accessing the binary that could modify the file is also something that must be logged.

Part of the dismay displayed in the thread comes from the fact that Fedora will probably never be certified with CAPP for any number of reasons. So taking away longstanding user abilities, though there are reasonable alternatives like man usermod, for a certification that won't be done, doesn't sit well with some in the Fedora community. Though, as Jef Spaleta notes, there might be a use for the certification in a Fedora spin:

Is there need for certified 'appliance' situations that a new 3rd party could leverage Fedora to create? I can imagine all sorts of no network software appliance situations where the CAPP certification applies and a Fedora derived image would be a good development target.

There is always going to be tension between the security needs of an "enterprise" distribution like RHEL and a more user/desktop-oriented distribution like Fedora. While the specific reduced functionality in this case is fairly minimal, the discussion increased the visibility of the auditing required for certification as well as what that means for both distributions. The original decision was made back in the Fedora Core days when there was much less visibility and community input into the process. Discussions like this will only help continue the process of opening up Fedora while also exposing some of the inadequacies of security certifications.

Comments (26 posted)

Brief items

PHP 5.2.7 withdrawn

The PHP 5.2.7 release has been withdrawn because it introduced a security hole. PHP users are advised to drop back to version 5.2.6 until the developers can put together a 5.2.8 update.

Update: PHP 5.2.8 is now available.

Comments (18 posted)

New vulnerabilities

Archive::Tar: directory traversal

Package(s):Archive-Tar CVE #(s):CVE-2007-4829
Created:December 10, 2008 Updated:July 22, 2010
Description: The Archive::Tar perl module, prior to version 1.40, suffers from a directory traversal vulnerability exploitable via a specially-crafted tar file.
Alerts:
CentOS CESA-2010:0505 perl-Archive-Tar 2010-07-21
CentOS CESA-2010:0505 perl-Archive-Tar 2010-07-12
Red Hat RHSA-2010:0505-01 perl-Archive-Tar 2010-07-01
Fedora FEDORA-2009-7680 perl 2009-07-15
Fedora FEDORA-2008-11736 perl 2008-12-24
Ubuntu USN-700-1 libarchive-tar-perl, perl 2008-12-24
Ubuntu USN-700-2 perl 2009-01-15
Gentoo 200812-10 Archive-Tar 2008-12-10

Comments (none posted)

awstats: fix incomplete fix for CVE-2008-3714

Package(s):awstats CVE #(s):CVE-2008-5080
Created:December 8, 2008 Updated:October 13, 2009
Description:

From the Red Hat bugzilla entry:

It was discovered that the upstream patch for cross-site scripting (XSS) issue in awstats known as CVE-2008-3714 does not completely resolve the problem and it still allows injection of quote characters.

Alerts:
Mandriva MDVSA-2009:266 awstats 2009-08-09
Fedora FEDORA-2008-10950 awstats 2008-12-08
Fedora FEDORA-2008-10962 awstats 2008-12-08
Fedora FEDORA-2008-10938 awstats 2008-12-08

Comments (none posted)

clamav: denial of service

Package(s):clamav CVE #(s):CVE-2008-5314
Created:December 4, 2008 Updated:December 24, 2008
Description: clamav has a denial of service vulnerability. From the Debian advisory: Ilja van Sprundel discovered that ClamAV contains a denial of service condition in its JPEG file processing because it does not limit the recursion depth when processing JPEG thumbnails (CVE-2008-5314).
Alerts:
Gentoo 200812-21 clamav 2008-12-23
SuSE SUSE-SR:2008:028 clamav, IBM Java, freeradius, squirrelmail 2008-12-16
Mandriva MDVSA-2008:239 clamav 2008-12-05
Fedora FEDORA-2008-10809 clamav 2008-12-07
Debian DSA-1680-1 clamav 2008-12-04

Comments (none posted)

compiz-plugins: illegal access to desktop

Package(s):compiz-plugins CVE #(s):
Created:December 9, 2008 Updated:December 10, 2008
Description: From the Ubuntu advisory: It was discovered that the Expo plugin for Compiz did not correctly restrict the screensaver window from being moved with the mouse. A local attacker could use the mouse to move the screensaver off the screen and gain access to the locked desktop session underneath. Default installs of Ubuntu were not vulnerable as Expo does not come pre-configured with mouse bindings.
Alerts:
Ubuntu USN-688-1 compiz-fusion-plugins-main 2008-12-09

Comments (none posted)

dbus: security bypass

Package(s):dbus CVE #(s):CVE-2008-4311
Created:December 8, 2008 Updated:April 21, 2009
Description:

From the freedesktop.org advisory

Joachim Breitner discovered a mistake in the default configuration for the system bus (system.conf) which made the default policy for both sent and received messages effectively *allow*, and not deny as intended.

Alerts:
openSUSE openSUSE-SU-2012:1418-1 dbus 2012-10-31
SuSE SUSE-SR:2009:009 openswan/strongswan, clamav, gstreamer-0_10-plugins-base, gnome-panel, postgresql, acroread_ja, ghostscript-devel, xine-devel/libxine-devel, moodle, gnutls, udev 2009-04-21
SuSE SUSE-SA:2009:013 dbus-1, 2009-03-17
Fedora FEDORA-2008-10733 dbus 2008-12-07
Fedora FEDORA-2008-10907 dbus 2008-12-07

Comments (none posted)

java: arbitrary code execution

Package(s):java CVE #(s):CVE-2008-2086
Created:December 4, 2008 Updated:November 18, 2009
Description: Java has an arbitrary code execution vulnerability. From the Red Hat alert: A vulnerability was found in in Java Web Start. If a user visits a malicious website, an attacker could misuse this flaw to execute arbitrary code. (CVE-2008-2086)
Alerts:
Gentoo 200911-02 sun-jre-bin 2009-11-17
SuSE SUSE-SR:2009:010 firefox apport evolution freetype2 java_1_4_2-ibm kdegraphics3 libopenssl libsoup xulrunner opensc python-crypto unbound xpdf 2009-05-12
SuSE SUSE-SA:2009:018 java 2009-04-07
Red Hat RHSA-2009:0445-01 java-1.4.2-ibm 2009-04-23
SuSE SUSE-SA:2009:007 IBMJava5-JRE,java-1_5_0-ibm 2009-01-29
Red Hat RHSA-2008:1025-01 java-1.5.0-sun 2008-12-04
Red Hat RHSA-2008:1018-01 java-1.6.0-sun 2008-12-04
Red Hat RHSA-2009:0015-01 java-1.6.0-ibm 2009-01-13
Red Hat RHSA-2009:0016-01 java-1.5.0-ibm 2009-01-13
SuSE SUSE-SA:2009:001 SunJava 2009-01-09

Comments (none posted)

java-1.6.0-openjdk: multiple vulnerabilities

Package(s):java-1.6.0-openjdk CVE #(s):CVE-2008-5350 CVE-2008-5349 CVE-2008-5347 CVE-2008-5348 CVE-2008-5360 CVE-2008-5359 CVE-2008-5351 CVE-2008-5356 CVE-2008-5352 CVE-2008-5358 CVE-2008-5353 CVE-2008-5354 CVE-2008-5357
Created:December 8, 2008 Updated:November 18, 2009
Description:

From the Fedora advisory:

[ 1 ] Bug #472201 - CVE-2008-5350 OpenJDK allows to list files within the user home directory (6484091) https://bugzilla.redhat.com/show_bug.cgi?id=472201
[ 2 ] Bug #472206 - CVE-2008-5349 OpenJDK RSA public key length denial-of-service (6497740) https://bugzilla.redhat.com/show_bug.cgi?id=472206
[ 3 ] Bug #472208 - CVE-2008-5347 OpenJDK applet privilege escalation via JAX package access (6592792) https://bugzilla.redhat.com/show_bug.cgi?id=472208
[ 4 ] Bug #472209 - CVE-2008-5348 OpenJDK Denial-Of-Service in kerberos authentication (6588160) https://bugzilla.redhat.com/show_bug.cgi?id=472209
[ 5 ] Bug #472211 - CVE-2008-5360 OpenJDK temporary files have guessable file names (6721753) https://bugzilla.redhat.com/show_bug.cgi?id=472211
[ 6 ] Bug #472212 - CVE-2008-5359 OpenJDK Buffer overflow in image processing (6726779) https://bugzilla.redhat.com/show_bug.cgi?id=472212
[ 7 ] Bug #472213 - CVE-2008-5351 OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) https://bugzilla.redhat.com/show_bug.cgi?id=472213
[ 8 ] Bug #472218 - CVE-2008-5356 OpenJDK Font processing vulnerability (6733336) https://bugzilla.redhat.com/show_bug.cgi?id=472218
[ 9 ] Bug #472233 - CVE-2008-5352 OpenJDK Jar200 Decompression buffer overflow (6755943) https://bugzilla.redhat.com/show_bug.cgi?id=472233
[ 10 ] Bug #472234 - CVE-2008-5358 OpenJDK Buffer Overflow in GIF image processing (6766136) https://bugzilla.redhat.com/show_bug.cgi?id=472234
[ 11 ] Bug #472224 - CVE-2008-5353 OpenJDK calender object deserialization allows privilege escalation (6734167) https://bugzilla.redhat.com/show_bug.cgi?id=472224
[ 12 ] Bug #472228 - CVE-2008-5354 OpenJDK Privilege escalation in command line applications (6733959) https://bugzilla.redhat.com/show_bug.cgi?id=472228
[ 13 ] Bug #472231 - CVE-2008-5357 OpenJDK Truetype Font processing vulnerability (6751322) https://bugzilla.redhat.com/show_bug.cgi?id=472231

Alerts:
SuSE SUSE-SR:2009:017 php5, newt, rubygem-actionpack, rubygem-activesupport, java-1_4_2-ibm, postgresql, samba, phpMyAdmin, viewvc 2009-10-26
Gentoo 200911-02 sun-jre-bin 2009-11-17
SuSE SUSE-SR:2009:016 silc-toolkit, open-iscsi, strongswan,freeswan,openswan, mutt, openldap2, cyrus-imapd, java-1_6_0-openjdk, postgresql, IBMJava2-JRE/java-1_4_2-ibm, wireshark, freeradius, dovecot 2009-10-13
SuSE SUSE-SR:2009:010 firefox apport evolution freetype2 java_1_4_2-ibm kdegraphics3 libopenssl libsoup xulrunner opensc python-crypto unbound xpdf 2009-05-12
SuSE SUSE-SA:2009:018 java 2009-04-07
Fedora FEDORA-2009-3058 java-1.6.0-openjdk 2009-03-26
Red Hat RHSA-2009:0369-01 java-1.6.0-ibm 2009-03-25
SuSE SUSE-SR:2009:006 curl, libmikmod, apache2, optipng, psi, java-1_6_0-openjdk, gtk2 2009-03-10
Red Hat RHSA-2009:0445-01 java-1.4.2-ibm 2009-04-23
Ubuntu USN-713-1 openjdk-6 2009-01-27
SuSE SUSE-SA:2009:007 IBMJava5-JRE,java-1_5_0-ibm 2009-01-29
Fedora FEDORA-2008-10913 java-1.6.0-openjdk 2008-12-07
Fedora FEDORA-2008-10860 java-1.6.0-openjdk 2008-12-07
Red Hat RHSA-2009:0015-01 java-1.6.0-ibm 2009-01-13
Red Hat RHSA-2009:0016-01 java-1.5.0-ibm 2009-01-13
SuSE SUSE-SA:2009:001 SunJava 2009-01-09

Comments (none posted)

kernel: buffer overflow

Package(s):linux-2.6.24 CVE #(s):CVE-2008-5134
Created:December 5, 2008 Updated:February 4, 2009
Description: The Kernel has a buffer overflow vulnerability. From the national vulnerability database entry: Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."
Alerts:
Ubuntu USN-714-1 linux-source-2.6.15/22, linux 2009-01-29
Red Hat RHSA-2009:0053-01 kernel 2009-02-04
Debian DSA-1681-1 linux-2.6.24 2008-12-04
SuSE SUSE-SA:2009:004 kernel 2009-01-21

Comments (none posted)

kernel: denial of service

Package(s):linux-2.6.24 CVE #(s):CVE-2008-5300
Created:December 5, 2008 Updated:November 4, 2009
Description: The kernel has a denial of service vulnerability. From the national vulnerability database entry: Linux kernel 2.6.28 allows local users to cause a denial of service ("soft lockup" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.
Alerts:
CentOS CESA-2009:1550 kernel 2009-11-04
Red Hat RHSA-2009:1550-01 kernel 2009-11-03
Red Hat RHSA-2009:0021-01 kernel 2009-02-24
Fedora FEDORA-2008-11618 kernel 2008-07-29
Fedora FEDORA-2008-11593 kernel 2008-12-26
CentOS CESA-2009:0014 kernel 2009-01-15
Ubuntu USN-714-1 linux-source-2.6.15/22, linux 2009-01-29
Red Hat RHSA-2009:0014-01 kernel 2009-01-14
Debian DSA-1687-1 linux-2.6 2008-12-15
rPath rPSA-2008-0332-1 kernel 2008-12-09
Debian DSA-1681-1 linux-2.6.24 2008-12-04
Red Hat RHSA-2009:0053-01 kernel 2009-02-04
Mandriva MDVSA-2009:032 kernel 2009-01-30
Ubuntu USN-715-1 linux 2009-01-29
SuSE SUSE-SA:2009:003 kernel-debug 2009-01-20

Comments (none posted)

kernel: privilege escalation

Package(s):linux-2.6.24 CVE #(s):CVE-2008-5182
Created:December 5, 2008 Updated:February 25, 2009
Description: The kernel has a privilege escalation vulnerability. From the national vulnerability database entry: The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.
Alerts:
Red Hat RHSA-2009:0021-01 kernel 2009-02-24
Fedora FEDORA-2008-11618 kernel 2008-07-29
Fedora FEDORA-2008-11593 kernel 2008-12-26
Red Hat RHSA-2009:0053-01 kernel 2009-02-04
Ubuntu USN-715-1 linux 2009-01-29
Ubuntu USN-714-1 linux-source-2.6.15/22, linux 2009-01-29
SuSE SUSE-SA:2009:008 kernel 2009-01-29
rPath rPSA-2008-0332-1 kernel 2008-12-09
Debian DSA-1681-1 linux-2.6.24 2008-12-04
SuSE SUSE-SA:2009:004 kernel 2009-01-21
Red Hat RHSA-2009:0225-02 kernel 2009-01-20
SuSE SUSE-SA:2009:003 kernel-debug 2009-01-20

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2008-5079
Created:December 9, 2008 Updated:October 5, 2009
Description: From the CVE entry: net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.
Alerts:
Fedora FEDORA-2009-8647 kernel 2009-08-15
Fedora FEDORA-2009-8264 kernel 2009-08-04
Fedora FEDORA-2009-6883 kernel 2009-06-23
Fedora FEDORA-2009-6846 kernel 2009-06-23
Fedora FEDORA-2009-10165 kernel 2009-10-03
Fedora FEDORA-2009-5383 kernel 2009-05-25
Fedora FEDORA-2009-5356 kernel 2009-05-25
Debian DSA-1787-1 linux-2.6.24 2009-05-02
SuSE SUSE-SA:2009:010 kernel 2009-02-26
Red Hat RHSA-2009:0021-01 kernel 2009-02-24
Fedora FEDORA-2008-11618 kernel 2008-07-29
Fedora FEDORA-2008-11593 kernel 2008-12-26
Red Hat RHSA-2009:0053-01 kernel 2009-02-04
Ubuntu USN-714-1 linux-source-2.6.15/22, linux 2009-01-29
SuSE SUSE-SA:2009:008 kernel 2009-01-29
Debian DSA-1687-1 linux-2.6 2008-12-15
rPath rPSA-2008-0332-1 kernel 2008-12-09
Mandriva MDVSA-2009:032 kernel 2009-01-30
Ubuntu USN-715-1 linux 2009-01-29
SuSE SUSE-SA:2009:004 kernel 2009-01-21
Red Hat RHSA-2009:0225-02 kernel 2009-01-20
SuSE SUSE-SA:2009:003 kernel-debug 2009-01-20

Comments (none posted)

lcms: buffer overflows

Package(s):lcms CVE #(s):CVE-2008-5316 CVE-2008-5317
Created:December 10, 2008 Updated:January 8, 2009
Description: The lcms color management utility suffers from a couple of buffer overflow vulnerabilities which could be exploited via a specially-crafted image file.
Alerts:
Ubuntu USN-693-1 LittleCMS 2008-12-17
CentOS CESA-2009:0011 lcms 2009-01-08
Debian DSA-1684 lcms 2008-12-10
Red Hat RHSA-2009:0011-01 lcms 2009-01-07

Comments (none posted)

mgetty: insecure use of tmp file

Package(s):mgetty CVE #(s):CVE-2008-4936
Created:December 8, 2008 Updated:December 10, 2008
Description:

From the Gentoo advisory:

Dmitry E. Oboukhov reported that the "spooldir" directory in fax/faxspool.in is created in an insecure manner.

A local attacker could exploit this vulnerability to overwrite arbitrary files with the privileges of the user running the application.

Alerts:
Gentoo 200812-08 mgetty 2008-12-06

Comments (none posted)

apache: multiple vulnerabilities

Package(s):apache CVE #(s):CVE-2007-6420 CVE-2008-2364 CVE-2008-2939
Created:December 5, 2008 Updated:December 7, 2009
Description: The Apache web server has multiple vulnerabilities. From the Red Hat vulnerability report:

A flaw was found in the mod_proxy module. An attacker who has control of a web server to which requests are being proxied could cause a limited denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)

A flaw was found in the mod_proxy_ftp module. Where Apache is configured to support ftp-over-httpd proxying, a remote attacker could perform a cross-site scripting attack. (CVE-2008-2939)

A cross-site request forgery issue was found in the mod_proxy_balancer module. A remote attacker could cause a denial of service if mod_proxy_balancer is enabled and an authenticated user is targeted. (CVE-2007-6420)

Alerts:
Mandriva MDVSA-2009:323 apache 2009-12-07
Mandriva MDVSA-2009:124-1 apache 2009-07-08
Mandriva MDVSA-2009:124 apache 2009-05-31
Ubuntu USN-731-1 apache2 2009-03-10
SuSE SUSE-SR:2009:006 curl, libmikmod, apache2, optipng, psi, java-1_6_0-openjdk, gtk2 2009-03-10
Red Hat RHSA-2008:0966-02 Red Hat Application Stack 2008-12-04

Comments (none posted)

ruby: denial of service

Package(s):ruby CVE #(s):CVE-2008-4310
Created:December 5, 2008 Updated:December 10, 2008
Description: ruby has a denial of service vulnerability. From the Red Hat security advisory: Vincent Danen reported, that Red Hat Security Advisory RHSA-2008:0897 did not properly address a denial of service flaw in the WEBrick (Ruby HTTP server toolkit), known as CVE-2008-3656. This flaw allowed a remote attacker to send a specially-crafted HTTP request to a WEBrick server that would cause the server to use excessive CPU time. This update properly addresses this flaw. (CVE-2008-4310)
Alerts:
CentOS CESA-2008:0981 No RH alert RHSA-2008:0981-01 2008-12-05

Comments (none posted)

squirrelmail: cross-site scripting

Package(s):squirrelmail CVE #(s):CVE-2008-2379
Created:December 8, 2008 Updated:May 13, 2009
Description:

From the Debian advisory:

Ivan Markovic discovered that SquirrelMail, a webmail application, did not sufficiently sanitise incoming HTML email, allowing an attacker to perform cross site scripting through sending a malicious HTML email.

Alerts:
CentOS CESA-2009:0010 squirrelmail 2009-01-12
Red Hat RHSA-2009:0010-01 squirrelmail 2009-01-12
SuSE SUSE-SR:2008:027 squirrelmail, gnutls, rubygem-activerecord, rubygem-actionpack, samba, dbus-1, pdns, php5, pam_krb5 2008-12-09
Fedora FEDORA-2008-10748 squirrelmail 2008-12-07
Fedora FEDORA-2008-10740 squirrelmail 2008-12-07
Fedora FEDORA-2008-10918 squirrelmail 2008-12-07
Debian DSA-168201 squirrelmail 2008-12-07

Comments (none posted)

syslog-ng: chroot jail escape

Package(s):syslog-ng CVE #(s):CVE-2008-5110
Created:December 8, 2008 Updated:July 13, 2009
Description:

From the Red Hat bugzilla entry:

syslog-ng does not call chdir before it calls chroot, which might allow attackers to escape the intended jail. NOTE: this is only a vulnerability when a separate vulnerability is present.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791

http://www.openwall.com/lists/oss-security/2008/11/17/3

Alerts:
Gentoo 200907-10 syslog-ng 2009-07-12
Fedora FEDORA-2008-10879 syslog-ng 2008-12-07
Fedora FEDORA-2008-10752 syslog-ng 2008-12-07
Fedora FEDORA-2008-10920 syslog-ng 2008-12-07

Comments (none posted)

vim: information exposure

Package(s):vim CVE #(s):CVE-2008-4677
Created:December 4, 2008 Updated:March 24, 2009
Description: The vim editor has an information exposure vulnerability. From the Mandriva alert: A vulnerability was found in certain versions of netrw.vim where it would send FTP credentials stored for an FTP session to subsequent FTP sessions to servers on different hosts, exposing FTP credentials to remote hosts (CVE-2008-4677).
Alerts:
SuSE SUSE-SR:2009:007 vim, gvim, apache2, opera, multipath tools, java-1_6_0-openjdk, imp, horde, lcms, moodle, ghostscript 2009-03-24
Mandriva MDVSA-2008:236-1 vim 2008-12-08
Mandriva MDVSA-2008:236 vim 2008-12-03

Comments (none posted)

vinagre: format string flaw

Package(s):vinagre CVE #(s):
Created:December 8, 2008 Updated:December 11, 2008
Description: From the Ubuntu advisory:

Alfredo Ortega discovered a flaw in Vinagre's use of format strings. A remote attacker could exploit this vulnerability if they tricked a user into connecting to a malicious VNC server, or opening a specially crafted URI with Vinagre.

Alerts:
Mandriva MDVSA-2008:240 vinagre 2008-12-10
Ubuntu USN-689-1 vinagre 2008-12-10
Fedora FEDORA-2008-10956 vinagre 2008-12-08
Fedora FEDORA-2008-10932 vinagre 2008-12-08
Fedora FEDORA-2008-10941 vinagre 2008-12-08

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2008, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds