|
|
Subscribe / Log in / New account

Security

Seunshare, /tmp directories, and the "sticky" bit

By Jake Edge
March 2, 2011

The /tmp directory has been an unceasing source of security problems going back decades; there are still regular reports of vulnerabilities from insecure usage of temporary files. Part of the problem is that /tmp (and /var/tmp) are shared resources that can be written to by any process, which allows attackers to use various race conditions (typically time-of-check-to-time-of-use (TOCTTOU) races) in insecurely written programs to elevate their privileges. It is a bit ironic, then, that a utility specifically geared toward running a program with a private /tmp directory (for application sandboxing) would run afoul of a somewhat different kind of temporary file vulnerability—one that was long-ago excised by the advent of "sticky" directories. But that is just what Tavis Ormandy found.

The basic problem is that insecure programs often open files in /tmp after checking to see whether the file exists. In the window between the time that the test is done and the time that the file is opened, a malicious program can swap in a file of its choosing (or, more likely, a symbolic or hard link to a file of its choosing). When that happens, the buggy program is operating on a file that it does not expect and that can cause all manner of mayhem. For normally privileged programs, that mayhem is largely restricted, but for setuid programs, it can lead to full system compromise.

Long ago, attackers could use the world-writable attribute of /tmp to delete files that were created by setuid programs. The attacker could then replace the file with a link, and when a privileged program re-opened the file—something that is, in general, a bad practice with temporary files—it would be opening a file of the attacker's choice. But, the advent of the "sticky" bit as applied to directory permissions closed that loophole by only allowing the file owner (or root) to delete a file in a sticky directory. Since that time, lots of code has been written with a sticky /tmp directory in mind.

As part of its efforts to use SELinux to provide application sandboxes, Red Hat created the seunshare utility. That utility will run a command with alternate /tmp and home directories, along with a given SELinux context. seunshare will "unshare" the default mount namespace (so that the command has its own view of the filesystem hierarchy), mount the specified directories over top of /tmp and the home directory, and instruct the kernel to execute the command in the (optionally) given SELinux context. Since the temporary directory specified is under the control of the user, it doesn't necessarily have the sticky bit set, which leads to the vulnerability.

In Ormandy's example, he uses ksu to show how the /etc/passwd file could be overwritten by running ksu under seunshare. There are likely other setuid programs that make the assumption that their temporary files are in sticky directories, and quite possibly some where the consequences could be more severe than just trashing the password file. So a mechanism that was meant to provide more security actually left a hole behind. Unfortunately, this is not an uncommon occurrence in the security realm.

This particular case also shows the value of disclosing security vulnerabilities. Ormandy reported the bug back in September and, though there was a flurry of discussion about it, that discussion died off in late November (at least in the bug report). Things didn't pick up again until Ormandy posted a request for an update, along with notice that he was ready to publish an advisory, on February 18. Hearing no complaint, he did so on February 23.

After that, the discussion picked up again, with solutions being proposed, though no fix is yet available for Fedora or RHEL. One has to wonder how long this potential local privilege escalation might have languished had Ormandy not released his advisory. As a temporary mitigation, Ormandy suggests removing the setuid bit from seunshare or restricting access to it. The solution that Dan Walsh has proposed removes the -t tmpdir argument to seunshare and instead mounts a tmpfs on /tmp (with the sticky bit set). Presumably that will be released in the near future.

There has been an attempt to harden the behavior of sticky directories to try to avoid some of the longstanding /tmp directory problems—though that would not have thwarted this particular vulnerability because it relies on the directory being sticky. There has been resistance to that effort because it is seen as something of an ugly hack to work around badly written code, so it has not made it into the mainline (though Ubuntu and other kernels do have that hardening). But temporary file vulnerabilities of various sorts still rear their head with depressing frequency. We will undoubtedly see others crop up in the future.

Comments (6 posted)

Brief items

Security quotes of the week

Sometimes, when I'm in a fanciful mood, I enjoy devices like brain-scanning lie detectors, and hi-tech sniffer dogs, because their appeal speaks to our desire for simple mechanical explanations in a complex world, and for machines to aggrandise intuition, or make it more sciencey. But I enjoy them mostly because - like the ridiculous new porno-scanners in US airports, that give staff a view of your breasts and penis - they show how much of security is about theatre rather than reality.
-- Ben Goldacre (Thanks to Felipe Sateler.)

The constitutionality of state and federal information privacy laws have historically and consistently been called into question, and things would be no different if—and it's a big if—Congress grants the FTC [Federal Trade Commission] authority over online tracking. When considering technical standards and what "tracking" means, it's worth keeping in mind the possible constitutional challenges insofar as state action may be involved, as some desirable options to curb online tracking may only be possible within a voluntary or self-regulatory framework.
-- Harlan Yu in the Freedom to Tinker blog

While "scare 'em and snare 'em" may be business as usual in the IT security industry, other HBGary Federal skunk works projects clearly crossed a line: a proposal for a major U.S. bank, allegedly Bank of America, to launch offensive cyber attacks on the servers that host the whistle blower site Wikileaks. HBGary was part of a triumvirate of firms that also included Palantir Inc and Berico Technologies, that was working with the law firm of the U.S. Chamber of Commerce to develop plans to target progressive groups, labor unions and other left-leaning non profits who the Chamber opposed with a campaign of false information and entrapment.
-- Paul Roberts at threatpost.com

Comments (1 posted)

Wallach: Things overheard on the WiFi from my Android smartphone

Over at the Freedom to Tinker blog, Dan Wallach reports on an experiment he did with his undergraduate security class: using Wireshark and Mallory to listen in on what his Android phone was sending. He describes what was found for a number of different applications including Gmail, Google Voice and Calendar, Facebook, Twitter, Angry Birds, and more. "What options do Android users have, today, to protect themselves against eavesdroppers? Android does support several VPN configurations which you could configure before you hit the road. That won't stop the unnecessary transmission of your fine GPS coordinates, which, to my mind, neither SoundHound nor ShopSaavy have any business knowing. If that's an issue for you, you could turn off your GPS altogether, but you'd have to turn it on again later when you want to use maps or whatever else. Ideally, I'd like the Market installer to give me the opportunity to revoke GPS privileges for apps like these."

Comments (21 posted)

Firefox and Thunderbird security updates

Mozilla has released Firefox 3.6.14 and 3.5.17 and Thunderbird 3.1.8, each of which fix some security vulnerabilities, including some that are marked "critical". Mozilla strongly recommends that all users upgrade to the new releases. Each Firefox release fixes eight critical, one high, and one moderate vulnerability (3.6.14, 3.5.17), while the Thunderbird release fixes two critical, and one moderate flaw (3.1.8).

Comments (1 posted)

New vulnerabilities

abcm2ps: multiple vulnerabilities

Package(s):abcm2ps CVE #(s):CVE-2010-4743 CVE-2010-4744
Created:March 1, 2011 Updated:November 21, 2011
Description: From the Red Hat bugzilla:

Abcm2ps upstream has released latest v5.9.13 version, fixing "yet more multiple unspecified vulnerabilities": http://moinejf.free.fr/abcm2ps-5.txt

Alerts:
Gentoo 201111-12 abcm2ps 2011-11-20
Fedora FEDORA-2011-1851 abcm2ps 2011-02-20

Comments (none posted)

acroread: multiple vulnerabilities

Package(s):acroread CVE #(s):CVE-2011-0562 CVE-2011-0563 CVE-2011-0565 CVE-2011-0566 CVE-2011-0567 CVE-2011-0585 CVE-2011-0586 CVE-2011-0587 CVE-2011-0589 CVE-2011-0590 CVE-2011-0591 CVE-2011-0592 CVE-2011-0593 CVE-2011-0594 CVE-2011-0595 CVE-2011-0596 CVE-2011-0598 CVE-2011-0599 CVE-2011-0600 CVE-2011-0602 CVE-2011-0603 CVE-2011-0604 CVE-2011-0606
Created:February 24, 2011 Updated:May 13, 2011
Description:

From the Red Hat advisory:

A specially-crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2011-0562, CVE-2011-0563, CVE-2011-0565, CVE-2011-0566, CVE-2011-0567, CVE-2011-0585, CVE-2011-0586, CVE-2011-0589, CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0594, CVE-2011-0595, CVE-2011-0596, CVE-2011-0598, CVE-2011-0599, CVE-2011-0600, CVE-2011-0602, CVE-2011-0603, CVE-2011-0606)

Multiple security flaws were found in Adobe reader. A specially-crafted PDF file could cause cross-site scripting (XSS) attacks against the user running Adobe Reader when opened. (CVE-2011-0587, CVE-2011-0604)

Alerts:
Gentoo 201201-19 acroread 2012-01-30
Gentoo 201110-11 adobe-flash 2011-10-13
openSUSE openSUSE-SU-2011:0492-1 flash-player 2011-05-13
SUSE SUSE-SA:2011:011 acroread 2011-03-07
openSUSE openSUSE-SU-2011:0156-1 acroread 2011-03-07
Red Hat RHSA-2011:0301-01 acroread 2011-02-23

Comments (none posted)

avahi: denial of service

Package(s):avahi CVE #(s):CVE-2011-1002
Created:February 24, 2011 Updated:September 12, 2011
Description:

From the Mandriva advisory:

avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244 (CVE-2011-1002).

Alerts:
Gentoo 201110-17 avahi 2011-10-22
Fedora FEDORA-2011-11588 avahi 2011-08-26
CentOS CESA-2011:0436 avahi 2011-04-14
Red Hat RHSA-2011:0436-01 avahi 2011-04-12
Pardus 2011-64 libcgroup pam_cgroups 2011-04-07
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
Red Hat RHSA-2011:0779-01 avahi 2011-05-19
Ubuntu USN-1084-1 avahi 2011-03-07
openSUSE openSUSE-SU-2011:0149-1 avahi 2011-03-02
Debian DSA-2174-1 avahi 2011-02-26
Mandriva MDVSA-2011:037 avahi 2011-02-24
Pardus 2011-67 avahi 2011-04-07

Comments (none posted)

clamav: arbitrary code execution

Package(s):clamav CVE #(s):CVE-2011-1003
Created:March 1, 2011 Updated:April 1, 2011
Description: From the Ubuntu advisory:

It was discovered that the Microsoft Office processing code in libclamav improperly handled certain Visual Basic for Applications (VBA) data. This could allow a remote attacker to craft a document that could crash clamav or possibly execute arbitrary code.

Alerts:
Gentoo 201110-20 clamav 2011-10-23
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
openSUSE openSUSE-SU-2011:0208-1 clamav 2011-03-22
Fedora FEDORA-2011-2741 clamav 2011-03-05
Fedora FEDORA-2011-2743 clamav 2011-03-05
Ubuntu USN-1076-1 clamav 2011-02-28

Comments (none posted)

firefox: multiple vulnerabilities

Package(s):firefox CVE #(s):CVE-2010-1585 CVE-2011-0051 CVE-2011-0053 CVE-2011-0054 CVE-2011-0055 CVE-2011-0056 CVE-2011-0057 CVE-2011-0058 CVE-2011-0059 CVE-2011-0061 CVE-2011-0062
Created:March 2, 2011 Updated:May 2, 2011
Description: From the Red Hat advisory:

A flaw was found in the way Firefox sanitized HTML content in extensions. If an extension loaded or rendered malicious content using the ParanoidFragmentSink class, it could fail to safely display the content, causing Firefox to execute arbitrary JavaScript with the privileges of the user running Firefox. (CVE-2010-1585)

A flaw was found in the way Firefox handled dialog boxes. An attacker could use this flaw to create a malicious web page that would present a blank dialog box that has non-functioning buttons. If a user closes the dialog box window, it could unexpectedly grant the malicious web page elevated privileges. (CVE-2011-0051)

Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0053, CVE-2011-0055, CVE-2011-0058, CVE-2011-0062)

Several flaws were found in the way Firefox handled malformed JavaScript. A website containing malicious JavaScript could cause Firefox to execute that JavaScript with the privileges of the user running Firefox. (CVE-2011-0054, CVE-2011-0056, CVE-2011-0057)

A flaw was found in the way Firefox handled malformed JPEG images. A website containing a malicious JPEG image could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-0061)

A flaw was found in the way Firefox handled plug-ins that perform HTTP requests. If a plug-in performed an HTTP request, and the server sent a 307 redirect response, the plug-in was not notified, and the HTTP request was forwarded. The forwarded request could contain custom headers, which could result in a Cross Site Request Forgery attack. (CVE-2011-0059)

Alerts:
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Gentoo 201301-01 firefox 2013-01-07
Pardus 2011-56 xulrunner firefox 2011-03-21
Debian DSA-2186-2 vimperator 2011-03-18
Fedora FEDORA-2011-2797 seamonkey 2011-03-07
Fedora FEDORA-2011-2796 seamonkey 2011-03-07
SUSE SUSE-SA:2011:013 MozillaFirefox,MozillaThunderbird,seamonkey 2011-03-15
openSUSE openSUSE-SU-2011:0169-1 MozillaFirefox 2011-03-14
Debian DSA-2187-1 icedove 2011-03-09
Debian DSA-2186-1 iceweasel 2011-03-09
Slackware SSA:2011-068-01 seamonkey 2011-03-09
Slackware SSA:2011-068-02 firefox 2011-03-09
Fedora FEDORA-2011-2447 gnome-python2-extras 2011-03-02
Fedora FEDORA-2011-2447 galeon 2011-03-02
Fedora FEDORA-2011-2447 perl-Gtk2-MozEmbed 2011-03-02
Fedora FEDORA-2011-2447 mozvoikko 2011-03-02
Fedora FEDORA-2011-2447 gnome-web-photo 2011-03-02
Fedora FEDORA-2011-2447 xulrunner 2011-03-02
Fedora FEDORA-2011-2447 firefox 2011-03-02
Ubuntu USN-1049-2 firefox, firefox-{3.0,3.5}, xulrunner-1.9.2 2011-03-07
Mandriva MDVSA-2011:042 mozilla-thunderbird 2011-03-07
Mandriva MDVSA-2011:041 firefox 2011-03-03
Debian DSA-2180-1 iceape 2011-03-03
Ubuntu USN-1050-1 thunderbird 2011-03-03
Ubuntu USN-1049-1 firefox, firefox-{3.0,3.5}, xulrunner-1.9.2 2011-03-03
Fedora FEDORA-2011-2444 galeon 2011-03-02
Fedora FEDORA-2011-2444 gnome-python2-extras 2011-03-02
Fedora FEDORA-2011-2444 gnome-web-photo 2011-03-02
Fedora FEDORA-2011-2444 perl-Gtk2-MozEmbed 2011-03-02
Fedora FEDORA-2011-2444 mozvoikko 2011-03-02
Fedora FEDORA-2011-2444 xulrunner 2011-03-02
Fedora FEDORA-2011-2444 firefox 2011-03-02
CentOS CESA-2011:0310 firefox 2011-03-02
CentOS CESA-2011:0312 thunderbird 2011-03-02
CentOS CESA-2011:0313 seamonkey 2011-03-02
Slackware SSA:2011-060-01 firefox 2011-03-02
Red Hat RHSA-2011:0312-01 thunderbird 2011-03-01
Red Hat RHSA-2011:0311-01 thunderbird 2011-03-01
Red Hat RHSA-2011:0313-01 seamonkey 2011-03-01
Red Hat RHSA-2011:0310-01 firefox 2011-03-01
Ubuntu USN-1123-1 xulrunner-1.9.1 2011-04-30

Comments (none posted)

fuse: denial of service

Package(s):fuse CVE #(s):CVE-2011-0541 CVE-2011-0542 CVE-2011-0543
Created:March 1, 2011 Updated:July 22, 2011
Description: From the Ubuntu advisory:

It was discovered that FUSE would incorrectly follow symlinks when checking mountpoints under certain conditions. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial of service.

Alerts:
Mageia MGASA-2012-0339 fuse 2012-11-23
Scientific Linux SL-fuse-20110720 fuse 2011-07-20
Red Hat RHSA-2011:1083-01 fuse 2011-07-20
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
openSUSE openSUSE-SU-2011:0264-1 fuse 2011-03-31
openSUSE openSUSE-SU-2011:0265-1 fuse 2011-03-31
Ubuntu USN-1077-1 fuse 2011-02-28

Comments (none posted)

gimp: multiple vulnerabilities

Package(s):gimp CVE #(s):CVE-2010-4540 CVE-2010-4541 CVE-2010-4542 CVE-2010-4543
Created:February 28, 2011 Updated:September 28, 2012
Description: From the Pardus advisory:

CVE-2010-4540 gimp LIGHTING EFFECTS > LIGHT plugin stack buffer overflow

CVE-2010-4541 gimp SPHERE DESIGNER plugin stack buffer overflow

CVE-2010-4542 gimp GFIG plugin stack buffer overflow

CVE-2010-4543 gimp heap overflow read_channel_data() in file-psp.c

Alerts:
Gentoo 201209-23 gimp 2012-09-28
Debian DSA-2426-1 gimp 2012-03-06
Fedora FEDORA-2011-7397 gimp 2011-05-25
Fedora FEDORA-2011-7393 gimp 2011-05-25
CentOS CESA-2011:0837 gimp 2011-06-01
CentOS CESA-2011:0838 gimp 2011-05-31
Red Hat RHSA-2011:0838-01 gimp 2011-05-31
Red Hat RHSA-2011:0837-01 gimp 2011-05-31
Red Hat RHSA-2011:0839-01 gimp 2011-05-31
Mandriva MDVSA-2011:103 gimp 2011-05-29
Fedora FEDORA-2011-7371 gimp 2011-05-25
Ubuntu USN-1109-1 gimp 2011-04-13
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
openSUSE openSUSE-SU-2011:0162-1 gimp 2011-03-10
Pardus 2011-52 gimp 2011-02-28

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2010-4251
Created:March 2, 2011 Updated:July 5, 2011
Description: From the Red Hat advisory:

A flaw was found in the Linux kernel's networking subsystem. If the number of packets received exceeded the receiver's buffer limit, they were queued in a backlog, consuming memory, instead of being discarded. A remote attacker could abuse this flaw to cause a denial of service (out-of-memory condition).

Alerts:
Oracle ELSA-2013-1645 kernel 2013-11-26
openSUSE openSUSE-SU-2013:0927-1 kernel 2013-06-10
Ubuntu USN-1218-1 linux 2011-09-29
Ubuntu USN-1216-1 linux-ec2 2011-09-26
Ubuntu USN-1208-1 linux-mvl-dove 2011-09-14
Ubuntu USN-1204-1 linux-fsl-imx51 2011-09-13
Ubuntu USN-1203-1 linux-mvl-dove 2011-09-13
SUSE SUSE-SU-2011:0737-1 kernel 2011-07-05
SUSE SUSE-SU-2011:0711-1 kernel 2011-06-29
Red Hat RHSA-2011:0883-01 kernel 2011-06-21
Scientific Linux SL-kern-20110519 kernel 2011-05-19
CentOS CESA-2011:0303 kernel 2011-04-14
SUSE SUSE-SA:2011:019 kernel 2011-04-28
Red Hat RHSA-2011:0542-01 kernel 2011-05-19
openSUSE openSUSE-SU-2011:0399-1 kernel 2011-04-28
Red Hat RHSA-2011:0303-01 kernel 2011-03-01
SUSE SUSE-SA:2011:026 kernel 2011-05-20

Comments (none posted)

logwatch: privilege escalation/arbitrary code execution

Package(s):logwatch CVE #(s):CVE-2011-1018
Created:March 1, 2011 Updated:March 28, 2012
Description: From the Ubuntu advisory:

Dominik George discovered that logwatch did not properly sanitize log file names that were passed to the shell as part of a command. If a remote attacker were able to generate specially crafted filenames (for example, via Samba logging), they could execute arbitrary code with root privileges.

Alerts:
Gentoo 201203-20 logwatch 2012-03-28
CentOS CESA-2011:0324 logwatch 2011-04-14
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
openSUSE openSUSE-SU-2011:0242-1 logwatch 2011-03-30
Fedora FEDORA-2011-2318 logwatch 2011-03-01
Fedora FEDORA-2011-2328 logwatch 2011-03-01
Red Hat RHSA-2011:0324-01 logwatch 2011-03-07
Ubuntu USN-1078-1 logwatch 2011-03-01

Comments (none posted)

openjdk: privilege escalation

Package(s):openjdk-6 CVE #(s):CVE-2011-0706
Created:March 1, 2011 Updated:June 15, 2011
Description: From the CVE entry:

The JNLPClassLoader class in IcedTea-Web before 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote attackers to gain privileges via unknown vectors related to multiple signers and the assignment of "an inappropriate security descriptor."

Alerts:
Gentoo 201406-32 icedtea-bin 2014-06-29
Mandriva MDVSA-2011:054 java-1.6.0-openjdk 2011-03-27
Ubuntu USN-1079-3 openjdk-6b18 2011-03-17
Ubuntu USN-1079-2 openjdk-6b18 2011-03-15
openSUSE openSUSE-SU-2011:0155-1 java-1_6_0-openjdk 2011-03-07
Ubuntu USN-1079-1 openjdk-6 2011-03-01
Debian DSA-2224-1 openjdk-6 2011-04-20

Comments (none posted)

pam-pgsql: buffer overflow

Package(s):pam-pgsql CVE #(s):
Created:February 28, 2011 Updated:March 2, 2011
Description: From the Debian advisory:

It was discovered that pam-pgsql, a PAM module to authenticate using a PostgreSQL database, was vulnerable to a buffer overflow in supplied IP-addresses.

Alerts:
Debian DSA-2173-1 pam-pgsql 2011-02-26

Comments (none posted)

pango: arbitrary code execution

Package(s):pango CVE #(s):CVE-2011-0064
Created:March 2, 2011 Updated:April 1, 2011
Description: From the Red Hat advisory:

It was discovered that Pango did not check for memory reallocation failures in the hb_buffer_ensure() function. An attacker able to trigger a reallocation failure by passing sufficiently large input to an application using Pango could use this flaw to crash the application or, possibly, execute arbitrary code with the privileges of the user running the application.

Alerts:
Gentoo 201405-13 pango 2014-05-17
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
openSUSE openSUSE-SU-2011:0221-1 pango 2011-03-24
Pardus 2011-58 pango 2011-03-21
Fedora FEDORA-2011-3194 pango 2011-03-12
Mandriva MDVSA-2011:040 pango 2011-03-03
Debian DSA-2178-1 pango1.0 2011-03-02
Ubuntu USN-1082-1 pango1.0 2011-03-02
Red Hat RHSA-2011:0309-01 pango 2011-03-01

Comments (none posted)

php: casting vulnerability

Package(s):php CVE #(s):CVE-2011-0708
Created:February 28, 2011 Updated:January 19, 2012
Description: From the Pardus advisory:

PHP Exif extension for 64bit platforms is affected by a casting vulnerability that occurs during the image header parsing.

Alerts:
SUSE SUSE-SU-2013:1351-1 PHP5 2013-08-16
Oracle ELSA-2012-1046 php 2012-06-30
Scientific Linux SL-php-20120130 php 2012-01-30
Oracle ELSA-2012-0071 php 2012-01-31
CentOS CESA-2012:0071 php 2012-01-30
Red Hat RHSA-2012:0071-01 php 2012-01-30
Scientific Linux SL-php-20120119 php 2012-01-19
Oracle ELSA-2012-0033 php 2012-01-18
CentOS CESA-2012:0033 php 2012-01-18
Red Hat RHSA-2012:0033-01 php 2012-01-18
Oracle ELSA-2011-1423 php53/php 2011-11-03
Oracle ELSA-2011-1423 php53/php 2011-11-03
Scientific Linux SL-NotF-20111102 php53/php 2011-11-02
CentOS CESA-2011:1423 php53 2011-11-03
Red Hat RHSA-2011:1423-01 php53/php 2011-11-02
Gentoo 201110-06 php 2011-10-10
Debian DSA-2266-1 php5 2011-06-29
Ubuntu USN-1126-2 php5 2011-05-05
Fedora FEDORA-2011-3666 maniadrive 2011-03-19
Fedora FEDORA-2011-3636 maniadrive 2011-03-19
Fedora FEDORA-2011-3666 php-eaccelerator 2011-03-19
Fedora FEDORA-2011-3636 php-eaccelerator 2011-03-19
Fedora FEDORA-2011-3666 php 2011-03-19
Fedora FEDORA-2011-3636 php 2011-03-19
SUSE SUSE-SR:2011:006 apache2-mod_php5/php5, cobbler, evince, gdm, kdelibs4, otrs, quagga 2011-04-05
openSUSE openSUSE-SU-2011:0276-1 php5 2011-04-01
Ubuntu USN-1126-1 php5 2011-04-29
Mandriva MDVSA-2011:052 php 2011-03-23
Mandriva MDVSA-2011:053 php 2011-03-23
Pardus 2011-51 php php-cli php-common 2011-02-28

Comments (none posted)

ruby: multiple vulnerabilities

Package(s):ruby CVE #(s):CVE-2011-1004 CVE-2011-1005
Created:February 28, 2011 Updated:March 8, 2013
Description: From the Pardus advisory:

A symlink race condition vulnerability was found in FileUtils.remove_entry_secure. The vulnerability allows local users to delete arbitrary files and directories. (CVE-2011-1004)

Exception#to_s method can be used to trick $SAFE check, which makes a untrusted codes to modify arbitrary strings. (CVE-2011-1005)

Alerts:
Gentoo 201412-27 ruby 2014-12-13
CentOS CESA-2013:0612 ruby 2013-03-09
Scientific Linux SL-ruby-20130307 ruby 2013-03-07
Fedora FEDORA-2012-15507 ruby 2012-10-14
Ubuntu USN-1583-1 ruby1.9.1 2012-09-25
Ubuntu USN-1377-1 ruby1.8 2012-02-27
CentOS CESA-2011:0908 ruby 2011-08-14
CentOS CESA-2011:0909 ruby 2011-06-30
Scientific Linux SL-ruby-20110628 ruby 2011-06-28
Scientific Linux SL-ruby-20110628 ruby 2011-06-28
Red Hat RHSA-2011:0910-01 ruby 2011-06-28
Red Hat RHSA-2011:0909-01 ruby 2011-06-28
Scientific Linux SL-ruby-20110628 ruby 2011-06-28
Red Hat RHSA-2011:0908-01 ruby 2011-06-28
openSUSE openSUSE-SU-2011:0561-1 ruby 2011-05-31
Fedora FEDORA-2011-1913 ruby 2011-02-21
Pardus 2011-49 ruby ruby-mode 2011-02-28
Mandriva MDVSA-2011:098 ruby 2011-05-23
Mandriva MDVSA-2011:097 ruby 2011-05-23

Comments (none posted)

samba: denial of service

Package(s):samba CVE #(s):CVE-2011-0719
Created:February 28, 2011 Updated:May 3, 2011
Description: From the Mandriva advisory:

All current released versions of Samba are vulnerable to a denial of service caused by memory corruption. Range checks on file descriptors being used in the FD_SET macro were not present allowing stack corruption. This can cause the Samba code to crash or to loop attempting to select on a bad file descriptor set.

Alerts:
Gentoo 201206-22 samba 2012-06-24
SUSE SUSE-SU-2012:0348-1 Samba 2012-03-09
Oracle ELSA-2012-0313 samba 2012-03-07
CentOS CESA-2011:0306 samba3x 2011-04-14
CentOS CESA-2011:0305 samba 2011-04-14
SUSE SUSE-SR:2011:008 java-1_6_0-ibm, java-1_5_0-ibm, java-1_4_2-ibm, postfix, dhcp6, dhcpcd, mono-addon-bytefx-data-mysql/bytefx-data-mysql, dbus-1, libtiff/libtiff-devel, cifs-mount/libnetapi-devel, rubygem-sqlite3, gnutls, libpolkit0, udisks 2011-05-03
openSUSE openSUSE-SU-2011:0403-1 samba 2011-04-28
Fedora FEDORA-2011-3120 samba 2011-03-11
Fedora FEDORA-2011-3118 samba 2011-03-11
Pardus 2011-54 samba samba-devel samba-swat 2011-03-03
CentOS CESA-2011:0305 samba 2011-03-02
Red Hat RHSA-2011:0306-01 samba3x 2011-03-01
Red Hat RHSA-2011:0305-01 samba 2011-03-01
Slackware SSA:2011-059-01 samba 2011-03-01
Ubuntu USN-1075-1 samba 2011-02-28
Debian DSA-2175-1 samba 2011-02-28
Mandriva MDVSA-2011:038 samba 2011-02-28

Comments (none posted)

wireshark: code execution

Package(s):wireshark CVE #(s):CVE-2011-0713
Created:February 28, 2011 Updated:April 19, 2011
Description: From the Pardus advisory:

An attacker can invite the victim to open a DCT3 capture with Wireshark, in order to create an overflow, leading to a denial of service or to code execution.

Alerts:
Gentoo 201110-02 wireshark 2011-10-09
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
Debian DSA-2201-1 wireshark 2011-03-23
Red Hat RHSA-2011:0369-01 wireshark 2011-03-21
Fedora FEDORA-2011-2620 wireshark 2011-03-04
Fedora FEDORA-2011-2632 wireshark 2011-03-04
Mandriva MDVSA-2011:044 wireshark 2011-03-08
Pardus 2011-50 wireshark 2011-02-28

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2011, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds