User: Password:
|
|
Subscribe / Log in / New account

Security

Trusted internet identity

By Jake Edge
January 12, 2011

The US government has recently been pushing a scheme to create some kind of "trusted" identity for people to use on the internet. At a meeting at Stanford University on January 7th, US Commerce Secretary Gary Locke outlined the problems that he perceives with trust on the internet and how the creation of "trusted digital identities" might alleviate those problems. There is likely some truth in what he says, and trusted identities could well fix some of the problems. Unfortunately, when looking at it from a privacy perspective, that kind of scheme is likely to cause more problems than it solves.

The threats that Locke describes are fairly well-known: "data breaches, malware, ID theft and spam". It's not exactly clear how a trusted identity would fix any of the problems he lists, but that's not really his role. He is trying to build a groundswell of support for these identities, but he is also being rather disingenuous when he says things like:

Let's be clear. We are not talking about a national ID card. We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.

PRIVACY Forum moderator (and long-time privacy advocate) Lauren Weinstein has been following this plan (which originates in the US Department of Homeland Security) since at least last June. As he points out, the entire trusted identity scheme rests on those identities being linked to government-issued IDs like driver's licenses or social security numbers. While Locke might be technically correct about national IDs, he is playing rather fast-and-loose with the reality as Weinstein notes:

This entire scheme rests on the ability to link Internet presence/roles with real-world identities. So even if no physical card ever exists, the system as currently understood would very much equate to a national ID card for accessing the Internet.

There are the obvious problems with linking internet activity back to a particular "meatspace" identity, not least that it removes the ability to do some things anonymously. Those records will be an attractive target for fishing expeditions by law enforcement of various sorts. One need not look any further than the current attempts to track down Wikileaks members and supporters via Twitter records as an example of how this kind of data might be misused.

At the meeting, White House Cybersecurity Coordinator Howard Schmidt said that there is no chance "a centralized database will emerge". Even if that's true, it won't be terribly hard to reconstruct an internet trail from distributed databases if the ID is tied to government-issued credentials.

Trusted IDs would also be a juicy target for identity thieves. In short, these IDs suffer from privacy and control issues that have been identified for decades by people like Weinstein and organizations like the Electronic Frontier Foundation. While Locke may be giving lip service to some of those longstanding concerns, it is pretty clear that, at least so far, there is no real intent to address them.

There is also a question of how free software fits into this puzzle. Is presenting a trusted identity going to require running proprietary code? Is it going to require running a Trusted Platform Module attested operating system as well? The latter is clearly something that Microsoft and Apple would be happy to see, but it would run completely counter to the ideas of free and open source software.

Ars technica digs in to some of the technical details of the most recent draft [PDF] of the proposal. That analysis certainly doesn't alleviate any of the issues that Weinstein raises, and in fact raises a few others, such as:

In stage number six, the project will address the "liability concerns of service providers and individuals." It looks as though the project will create rules for the system that allow for the fixing of security breaches without everyone suing each other's brains out, perhaps something like the Digital Millennium Copyright Act's safe harbor provisions. The last three stages involve promoting and improving the Ecosystem, including offering loans, tax breaks, and insurance grants for early adopters.

Another draft is due in the next few months, and Weinstein is not very optimistic:

Revised details of the Internet "Trusted ID" NSTIC plan will reportedly be released within a matter of months. Perhaps there will be wondrous revelations that will transform my current very dark view of the proposal into a ringing endorsement.

Unfortunately, I very much doubt that this will be the case. I wish I did not have to be so cynical and concerned about this project. Contrary to some observers, I don't feel that the proponents of this plan are evil or stupid, nor that their motives aren't in large measure essentially laudable.

But a lack of evil and stupidity does not eliminate short-sightedness, foolishness, and priorities run dangerously amok.

Schmidt is also pushing the idea that acquiring a trusted identity would be voluntary, but if the system gets put in place it's a little hard to believe it will be. The internet is playing a bigger and bigger role in our lives. If the US government succeeds in this plan, it's not hard to imagine that it will be difficult to do anything of consequence on the 'net without having such an ID.

This is an issue that bears watching. One might be forgiven for cynically noting that our best defense against this plan may be the government bureaucracy itself, as it will undoubtedly take some time—perhaps on the order of years—for a proposal like this to actually get implemented. In the meantime, though, privacy advocates and free software users should be making an effort to clearly show the problems inherent in this trusted identity scheme.

Comments (19 posted)

Brief items

Security quote of the week

So there you have it. The names are secure: they're identifiable by a key of arbitrary length and cannot be stolen. They're human-meaningful: the name can be whatever string you like. And they're decentralized: no centralized authority determines who gets what name and yet they're available to everyone in the network.
-- Aaron Swartz on a proposed way to "square" Zooko's triangle (by way of BoingBoing).

Comments (3 posted)

New vulnerabilities

apparmor: tasks may become unexpectedly unconfined

Package(s):apparmor CVE #(s):
Created:January 7, 2011 Updated:March 31, 2011
Description: From the Ubuntu advisory:

It was discovered that if AppArmor was misconfigured, under certain circumstances the parser could generate policy using an unconfined fallback execute transition when one was not specified.

Alerts:
openSUSE openSUSE-SU-2011:0268-1 apparmor-parser 2011-03-31
Ubuntu USN-1039-1 apparmor 2011-01-07

Comments (none posted)

bip: denial of service

Package(s):bip CVE #(s):CVE-2010-3071
Created:January 12, 2011 Updated:January 12, 2011
Description: A remote attacker can force a null pointer dereference in the bip IRC proxy, leading to a denial of service vulnerability.
Alerts:
Gentoo 201201-18 bip 2012-01-30
Fedora FEDORA-2010-15774 bip 2010-10-05

Comments (none posted)

cups: may start prematurely

Package(s):cups CVE #(s):
Created:January 7, 2011 Updated:January 12, 2011
Description: From the Ubuntu advisory:

Under certain circumstances, CUPS could start before its AppArmor profile was loaded and therefore run unconfined. This update ensures the AppArmor profile is loaded before CUPS starts.

Alerts:
Ubuntu USN-1036-1 cups 2011-01-06

Comments (none posted)

django: multiple vulnerabilities

Package(s):python-django CVE #(s):CVE-2010-4534 CVE-2010-4535
Created:January 7, 2011 Updated:February 15, 2011
Description: From the Ubuntu advisory:

Adam Baldwin discovered that Django did not properly validate query string lookups. This could be exploited to provide an information leak to an attacker with admin privilieges. (CVE-2010-4534)

Paul McMillan discovered that Django did not validate the length of the token used when generating a password reset. An attacker could exploit this to cause a denial of service via resource exhaustion. (CVE-2010-4535)

Alerts:
Pardus 2011-45 Django 2011-02-14
Ubuntu USN-1040-1 python-django 2011-01-07
Fedora FEDORA-2011-0096 Django 2011-01-04
Fedora FEDORA-2011-0120 Django 2011-01-04

Comments (none posted)

dpkg: directory traversal

Package(s):dpkg CVE #(s):CVE-2010-1679
Created:January 6, 2011 Updated:January 24, 2011
Description:

From the Debian advisory:

Jakub Wilk discovered that the dpkg-source component of dpkg, the Debian package management system, doesn't correctly handle paths in patches of source packages, which could make it traverse directories. Raphaël Hertzog additionally discovered that symbolic links in the .pc directory are followed, which could make it traverse directories too.

Alerts:
Ubuntu USN-1038-1 dpkg 2011-01-06
Debian DSA-2142-1 dpkg 2011-01-06
Fedora FEDORA-2011-0345 dpkg 2011-01-13
Fedora FEDORA-2011-0362 dpkg 2011-01-13

Comments (none posted)

ifupdown: dhcp may start prematurely

Package(s):ifupdown CVE #(s):
Created:January 7, 2011 Updated:January 12, 2011
Description: From the Ubuntu advisory:

Under certain circumstances, the DHCP client could start before its AppArmor profile was loaded and therefore run unconfined. This update ensures the AppArmor profile is loaded before DHCP client starts.

Alerts:
Ubuntu USN-1037-1 ifupdown 2011-01-06

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2010-4263
Created:January 12, 2011 Updated:July 14, 2011
Description: The igb driver contains a null pointer dereference vulnerability exploitable by a remote user in certain, limited conditions.
Alerts:
Oracle ELSA-2013-1645 kernel 2013-11-26
Ubuntu USN-1159-1 linux-mvl-dove 2011-07-13
Ubuntu USN-1162-1 linux-mvl-dove 2011-06-29
Ubuntu USN-1141-1 linux, linux-ec2 2011-05-31
Red Hat RHSA-2011:0007-01 kernel 2011-01-11
Red Hat RHSA-2011:0017-01 kernel 2011-01-13

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2010-4160
Created:January 12, 2011 Updated:March 11, 2011
Description: The PPP-over-L2TP socket implementation lacks some important boundary checks, enabling a local privilege escalation attack.
Alerts:
Oracle ELSA-2013-1645 kernel 2013-11-26
openSUSE openSUSE-SU-2013:0927-1 kernel 2013-06-10
Ubuntu USN-1204-1 linux-fsl-imx51 2011-09-13
Ubuntu USN-1202-1 linux-ti-omap4 2011-09-13
Red Hat RHSA-2011:0330-01 kernel-rt 2011-03-10
Ubuntu USN-1073-1 linux, linux-ec2 2011-02-25
Ubuntu USN-1072-1 linux 2011-02-25
Ubuntu USN-1071-1 linux-source-2.6.15 2011-02-25
SUSE SUSE-SA:2011:008 kernel 2011-02-11
SUSE SUSE-SA:2011:005 kernel 2011-01-25
SUSE SUSE-SA:2011:004 kernel 2011-01-14
Red Hat RHSA-2011:0007-01 kernel 2011-01-11
openSUSE openSUSE-SU-2011:0048-1 SLE11 2011-01-19

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2010-4249
Created:January 12, 2011 Updated:August 9, 2011
Description: The kernel's AF_UNIX garbage collection code has a flow allowing a local user to oops the kernel.
Alerts:
openSUSE openSUSE-SU-2012:1439-1 kernel 2012-11-05
openSUSE openSUSE-SU-2012:0799-1 kernel 2012-06-28
Ubuntu USN-1186-1 kernel 2011-08-09
Ubuntu USN-1167-1 linux 2011-07-13
CentOS CESA-2011:0303 kernel 2011-04-14
Ubuntu USN-1111-1 linux-source-2.6.15 2011-05-05
Ubuntu USN-1093-1 linux-mvl-dove 2011-03-25
Red Hat RHSA-2011:0330-01 kernel-rt 2011-03-10
Ubuntu USN-1083-1 linux-lts-backport-maverick 2011-03-03
Red Hat RHSA-2011:0303-01 kernel 2011-03-01
Ubuntu USN-1074-2 linux-fsl-imx51 2011-02-28
Ubuntu USN-1119-1 linux-ti-omap4 2011-04-20
Ubuntu USN-1074-1 linux-fsl-imx51 2011-02-25
Ubuntu USN-1073-1 linux, linux-ec2 2011-02-25
Ubuntu USN-1054-1 linux, linux-ec2 2011-02-01
Debian DSA-2153-1 linux-2.6 kernel 2011-01-30
CentOS CESA-2011:0162 kernel 2011-01-27
Red Hat RHSA-2011:0162-01 kernel 2011-01-18
Red Hat RHSA-2011:0007-01 kernel 2011-01-11

Comments (none posted)

kernel: information leak

Package(s):kernel CVE #(s):CVE-2010-4525
Created:January 12, 2011 Updated:April 28, 2011
Description: A missed initialization in KVM could leak information to a privileged local user.
Alerts:
Oracle ELSA-2013-1645 kernel 2013-11-26
openSUSE openSUSE-SU-2011:0399-1 kernel 2011-04-28
Red Hat RHSA-2011:0007-01 kernel 2011-01-11
Red Hat RHSA-2011:0028-01 kvm 2011-01-13

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2010-4668
Created:January 12, 2011 Updated:August 9, 2011
Description: The kernel block layer lacks some boundary checks in the block layer, enabling a local user to force a kernel oops.
Alerts:
openSUSE openSUSE-SU-2013:0927-1 kernel 2013-06-10
Ubuntu USN-1204-1 linux-fsl-imx51 2011-09-13
Ubuntu USN-1202-1 linux-ti-omap4 2011-09-13
Ubuntu USN-1187-1 kernel 2011-08-09
Ubuntu USN-1167-1 linux 2011-07-13
SUSE SUSE-SA:2011:017 kernel 2011-04-18
openSUSE openSUSE-SU-2011:0346-1 kernel 2011-04-18
SUSE SUSE-SA:2011:015 kernel 2011-03-24
Red Hat RHSA-2011:0330-01 kernel-rt 2011-03-10
Fedora FEDORA-2011-2134 kernel 2011-02-24
SUSE SUSE-SA:2011:012 kernel 2011-03-08
Fedora FEDORA-2011-1138 kernel 2011-02-07
openSUSE openSUSE-SU-2011:0399-1 kernel 2011-04-28
Debian DSA-2153-1 linux-2.6 kernel 2011-01-30
Red Hat RHSA-2011:0007-01 kernel 2011-01-11

Comments (none posted)

mhonarc: multiple vulnerabilities

Package(s):MHonArc CVE #(s):CVE-2010-4524 CVE-2010-1677
Created:January 10, 2011 Updated:March 24, 2011
Description: From the Mandriva advisory:

MHonArc 2.6.16 allows remote attackers to cause a denial of service (CPU consumption) via start tags that are placed within other start tags, as demonstrated by a <bo<bo<bo<bo<body>dy>dy>dy>dy> sequence, a different vulnerability than CVE-2010-4524 (CVE-2010-1677).

Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in MHonArc 2.6.16 allows remote attackers to inject arbitrary web script or HTML via a malformed start tag and end tag for a SCRIPT element, as demonstrated by <scr<body>ipt> and </scr<body>ipt> sequences (CVE-2010-4524).

Alerts:
Fedora FEDORA-2011-3390 mhonarc 2011-03-15
Fedora FEDORA-2011-3357 mhonarc 2011-03-15
Mandriva MDVSA-2011:003 MHonArc 2011-01-10

Comments (none posted)

php: denial of service

Package(s):php CVE #(s):CVE-2010-4645
Created:January 11, 2011 Updated:April 15, 2011
Description: From the CVE entry:

strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers.

Alerts:
Gentoo 201110-06 php 2011-10-10
CentOS CESA-2011:0196 php53 2011-04-14
SUSE SUSE-SR:2011:006 apache2-mod_php5/php5, cobbler, evince, gdm, kdelibs4, otrs, quagga 2011-04-05
openSUSE openSUSE-SU-2011:0276-1 php5 2011-04-01
Red Hat RHSA-2011:0196-01 php53 2011-02-03
Red Hat RHSA-2011:0195-01 php 2011-02-03
Fedora FEDORA-2011-0321 maniadrive-data 2011-01-12
Fedora FEDORA-2011-0329 maniadrive-data 2011-01-12
Fedora FEDORA-2011-0321 maniadrive 2011-01-12
Fedora FEDORA-2011-0329 maniadrive 2011-01-12
Ubuntu USN-1042-1 php5 2011-01-11
Slackware SSA:2011-010-01 php 2011-01-11
Fedora FEDORA-2011-0321 php-eaccelerator 2011-01-12
Fedora FEDORA-2011-0329 php-eaccelerator 2011-01-12
Fedora FEDORA-2011-0321 php 2011-01-12
Fedora FEDORA-2011-0329 php 2011-01-12

Comments (none posted)

php: cross-site scripting

Package(s):php5 CVE #(s):CVE-2009-5016
Created:January 12, 2011 Updated:February 4, 2011
Description: The PHP5 XML UTF8 decoder has an integer overflow vulnerability which allows an attacker to bypass cross-site scripting protections.
Alerts:
Gentoo 201110-06 php 2011-10-10
Red Hat RHSA-2011:0195-01 php 2011-02-03
Ubuntu USN-1042-1 php5 2011-01-11

Comments (none posted)

pidgin: denial of service

Package(s):pidgin CVE #(s):CVE-2010-4528
Created:January 10, 2011 Updated:February 25, 2011
Description: From the CVE entry:

directconn.c in the MSN protocol plugin in libpurple 2.7.6 through 2.7.8 in Pidgin before 2.7.9 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a short p2pv2 packet in a DirectConnect (aka direct connection) session.

Alerts:
Slackware SSA:2011-055-01 pidgin 2011-02-25
SUSE SUSE-SR:2011:001 finch/pidgin, libmoon-devel/moonlight-plugin, libsmi, openssl, perl-CGI-Simple, supportutils, wireshark 2011-01-11
openSUSE openSUSE-SU-2011:0021-1 pidgin 2011-01-10

Comments (none posted)

pidgin: denial of service

Package(s):pidgin CVE #(s):
Created:January 10, 2011 Updated:January 12, 2011
Description: From the Red Hat bugzilla:

A NULL pointer dereference flaw was found in the Pidgin MSN DirectConnect protocol implementation, by processing certain P2P messages. A remote, authenticated user could use this flaw to cause denial of service (Pidgin crash).

Alerts:
Fedora FEDORA-2010-19317 pidgin 2010-12-30

Comments (none posted)

pyfribidi: buffer overflow

Package(s):pyfribidi CVE #(s):CVE-2010-3444
Created:January 10, 2011 Updated:January 12, 2011
Description: From the Red Hat advisory:

It was reported that pyfribidi contains a buffer overflow in the log2vis_utf8() function due to the assumption that the string returned by fribidi_unicode_to_utf8() will be the same length as the original UTF-8 string. Due to changes in fribidi 0.19.1, for the Arabic language this is not the case as the joining added in fribidi causes some of the original 2-byte UTF-8 sequences to be come 3-bytes long.

Alerts:
Fedora FEDORA-2011-0010 pyfribidi 2011-01-01
Fedora FEDORA-2011-0001 pyfribidi 2011-01-01

Comments (none posted)

webkit: lots of vulnerabilities

Package(s):webkit CVE #(s):CVE-2009-1685 CVE-2009-1686 CVE-2009-1688 CVE-2009-1689 CVE-2009-1691 CVE-2009-1696 CVE-2009-1700 CVE-2009-1701 CVE-2009-1702 CVE-2009-1703 CVE-2009-1715 CVE-2009-1718 CVE-2009-1724 CVE-2009-2195 CVE-2009-2199 CVE-2009-2200 CVE-2009-2419 CVE-2009-2797 CVE-2009-3272 CVE-2009-3933 CVE-2009-3934 CVE-2010-0315 CVE-2010-0647 CVE-2010-0650 CVE-2010-0659 CVE-2010-0661 CVE-2010-1029 CVE-2010-1126 CVE-2010-1233 CVE-2010-1236 CVE-2010-1387 CVE-2010-1388 CVE-2010-1389 CVE-2010-1390 CVE-2010-1391 CVE-2010-1393 CVE-2010-1394 CVE-2010-1395 CVE-2010-1396 CVE-2010-1397 CVE-2010-1398 CVE-2010-1399 CVE-2010-1400 CVE-2010-1401 CVE-2010-1402 CVE-2010-1403 CVE-2010-1404 CVE-2010-1406 CVE-2010-1408 CVE-2010-1409 CVE-2010-1410 CVE-2010-1412 CVE-2010-1413 CVE-2010-1414 CVE-2010-1415 CVE-2010-1419 CVE-2010-1729 CVE-2010-1749 CVE-2010-1757 CVE-2010-1763 CVE-2010-1764 CVE-2010-1769 CVE-2010-1781 CVE-2010-1789 CVE-2010-1813 CVE-2010-1823 CVE-2010-1824 CVE-2010-1825 CVE-2010-2295 CVE-2010-2297 CVE-2010-2300 CVE-2010-2301 CVE-2010-2302 CVE-2010-2441 CVE-2010-3803 CVE-2010-3804 CVE-2010-3805 CVE-2010-3808 CVE-2010-3809 CVE-2010-3810 CVE-2010-3811 CVE-2010-3816 CVE-2010-3817 CVE-2010-3818 CVE-2010-3819 CVE-2010-3820 CVE-2010-3821 CVE-2010-3822 CVE-2010-3823 CVE-2010-3824 CVE-2010-3826 CVE-2010-3829 CVE-2010-3900 CVE-2010-4040
Created:January 12, 2011 Updated:August 23, 2011
Description: The CVEs attached to this vulnerability were all reported fixed by a recent openSUSE update. They all certainly relate to webkit, and some probably refer to serious vulnerabilities; click on the various CVE links for details.
Alerts:
Ubuntu USN-1195-1 webkit 2011-08-23
SUSE SUSE-SR:2011:009 mailman, openssl, tgt, rsync, vsftpd, libzip1/libzip-devel, otrs, libtiff, kdelibs4, libwebkit, libpython2_6-1_0, perl, pure-ftpd, collectd, vino, aaa_base, exim 2011-05-17
openSUSE openSUSE-SU-2011:0482-1 webkit 2011-05-13
Debian DSA-2188-1 webkit 2011-03-10
Mandriva MDVSA-2011:039 webkit 2011-03-02
Fedora FEDORA-2011-1224 webkitgtk 2011-02-09
openSUSE openSUSE-SU-2011:0024-1 webkit 2011-01-12
SUSE SUSE-SR:2011:002 ed, evince, hplip, libopensc2/opensc, libsmi, libwebkit, perl, python, sssd, sudo, wireshark 2011-01-25
MeeGo MeeGo-SA-10:37 webkit 2010-10-09

Comments (none posted)

webkitgtk: multiple vulnerabilities

Package(s):webkitgtk CVE #(s):CVE-2010-4198 CVE-2010-4197 CVE-2010-4204 CVE-2010-4206 CVE-2010-1791 CVE-2010-3812 CVE-2010-3813 CVE-2010-4577
Created:January 10, 2011 Updated:August 23, 2011
Description: From the CVE entries:

Google Chrome before 7.0.517.44 does not properly handle large text areas, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted HTML document. (CVE-2010-4198)

Use-after-free vulnerability in Google Chrome before 7.0.517.44 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving text editing. (CVE-2010-4197)

Google Chrome before 7.0.517.44 accesses a frame object after this object has been destroyed, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. (CVE-2010-4204)

Google Chrome before 7.0.517.44 accesses memory at an out-of-bounds array index during processing of an SVG document, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. (CVE-2010-4206)

Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index. (CVE-2010-1791)

Integer overflow in the wholeText method in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving Text objects. (CVE-2010-3812)

WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to bypass the DNS prefetching setting via an HTML LINK element, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality. (CVE-2010-3813)

Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 do not properly parse Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. (CVE-2010-4577)

Alerts:
Gentoo 201412-09 racer-bin, fmod, PEAR-Mail, lvm2, gnucash, xine-lib, lastfmplayer, webkit-gtk, shadow, PEAR-PEAR, unixODBC, resource-agents, mrouted, rsync, xmlsec, xrdb, vino, oprofile, syslog-ng, sflowtool, gdm, libsoup, ca-certificates, gitolite, qt-creator 2014-12-11
Ubuntu USN-1195-1 webkit 2011-08-23
Debian DSA-2188-1 webkit 2011-03-10
Mandriva MDVSA-2011:039 webkit 2011-03-02
Red Hat RHSA-2011:0177-01 webkitgtk 2011-01-25
openSUSE openSUSE-SU-2011:0024-1 webkit 2011-01-12
Fedora FEDORA-2011-0121 webkitgtk 2011-01-04
SUSE SUSE-SR:2011:002 ed, evince, hplip, libopensc2/opensc, libsmi, libwebkit, perl, python, sssd, sudo, wireshark 2011-01-25
MeeGo MeeGo-SA-10:37 webkit 2010-10-09

Comments (none posted)

wireshark: denial of service

Package(s):wireshark CVE #(s):CVE-2010-4301
Created:January 12, 2011 Updated:April 19, 2011
Description: A bug in the wireshark ZigBee ZCL dissector allows an attacker to throw the program into an infinite loop.
Alerts:
Gentoo 201110-02 wireshark 2011-10-09
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
SUSE SUSE-SR:2011:002 ed, evince, hplip, libopensc2/opensc, libsmi, libwebkit, perl, python, sssd, sudo, wireshark 2011-01-25
openSUSE openSUSE-SU-2011:0010-2 wireshark 2011-01-12

Comments (none posted)

wireshark: arbitrary code execution

Package(s):wireshark CVE #(s):CVE-2010-4538
Created:January 10, 2011 Updated:April 19, 2011
Description: From the Mandriva advisory:

Buffer overflow in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression

Alerts:
Gentoo 201110-02 wireshark 2011-10-09
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
Pardus 2011-21 wireshark 2011-01-31
CentOS CESA-2011:0013 wireshark 2011-01-27
Red Hat RHSA-2011:0013-01 wireshark 2011-01-10
Mandriva MDVSA-2011:002 wireshark 2011-01-09
Debian DSA-2144-1 wireshark 2011-01-15
Fedora FEDORA-2011-0167 wireshark 2011-01-05
Fedora FEDORA-2011-0128 wireshark 2011-01-05

Comments (none posted)

wordpress: unauthorized access

Package(s):wordpress-mu CVE #(s):CVE-2010-0682
Created:January 10, 2011 Updated:January 12, 2011
Description: From the CVE entry:

WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter.

Alerts:
Fedora FEDORA-2010-19330 wordpress-mu 2010-12-31
Fedora FEDORA-2010-19329 wordpress-mu 2010-12-31

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2011, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds