|
|
Log in / Subscribe / Register

Security

MeeGo rethinks privacy protection

By Jonathan Corbet
April 13, 2011
Companies operating in the handset market have different approaches to almost everything, but they do agree on one thing: they have seen the security problems which plague desktop systems and they want no part of them. There is little consistency in how the goal of a higher level of security is reached, though. Some companies go for heavy-handed central control of all software which can be installed on the device. Android uses sandboxing and a set of capabilities enforced by the Dalvik virtual machine. MeeGo's approach has been based on traditional Linux access control paired with the Smack mandatory access control module. But much has changed in the MeeGo world, and it appears that security will be changing too.

In early March, the project sent out a notice regarding a number of architectural changes made after Nokia's change of heart. With regard to security, the announcement said:

In the long-term, we will re-evaluate the direction we are taking with MeeGo security with a new focus on *End-User Privacy*. While we do not intend to immediately remove the security enabling technologies we have been including in MeeGo, all security technologies will be re-examined with this new focus in mind.

It appears that at least some of this reexamination has been done; the results were discussed in this message from Ryan Ware which focused mainly on the problem of untrusted third-party applications.

The MeeGo project, it seems, is reconsidering its decision to use the Smack access control module; a switch to SELinux may be in the works. SELinux would mainly be charged with keeping the trusted part of the system in line. All untrusted code would be sandboxed into its own container; each container gets a disposable, private filesystem in the form of a Btrfs snapshot. Through an unspecified mechanism (presumably the mandatory access control module), these untrusted containers could be given limited access to user data, device resources, etc.

It probably surprised nobody that Casey Schaufler, the author of Smack, was not sold on the value of a change to SELinux. This change would, he said, add a great deal of complexity to the system without adding any real security:

SELinux as provided in distributions today does not, for all its trappings, complexity and assurances, enforce any security policy. SELinux is capable of enforcing a security policy, but no general purpose system available today provides anything more than a general description of the experienced behavior of a small subset of the system supplied applications.

The people who built SELinux fell into a trap that has been claiming security developers since computers became programmable. The availability of granularity must not be assumed to imply that everything should be broken down into as fine a granularity as possible. The original Flask papers talk about a small number of well defined domains. Once the code was implemented however the granularity gremlins swarmed in and now the reference policy exceeds 900,000 lines. And it enforces nothing.

Ryan's response was that the existing SELinux reference policy is not relevant because MeeGo does not plan to use it:

At this point I want nothing to do with the Reference Policy. I would much prefer to focus on a limited set of functionality around privacy controls. I know that means it won't necessarily exhibit "expected" SELinux behavior. Given the relatively limited range of verticals we are trying to support, I believe we will be able to get away with that.

What this means is that he is talking about creating a new SELinux policy from the beginning. The success of such an endeavor is, to put it gently, not entirely assured. The current reference policy has taken many years and a great deal of pain to reach its current state of utility; there are very few examples of viable alternative policies out there. Undoubtedly other policies are possible, and they need not necessarily be as complex as the reference policy, but anybody setting out on such a project should be under no illusions that it will be easily accomplished.

The motivation for the switch to SELinux is unclear; Ryan suggests that manufacturers have been asking for it. He also said that manufacturers would be able to adjust the policy for their specific needs, a statement that Casey was not entirely ready to accept:

There are very few integrators, even in the military and intelligence arenas, who feel sufficiently confident with their SELinux policy skills to do any tweaking that isn't directly targeted at disabling the SELinux controls.

Ryan acknowledged that little difficulty, but he seems determined to press on in this direction.

The end goal of all this work is said to be preventing the exposure of end-user data. That will not be an easy goal to achieve either, though. Once an application gets access to a user's data, even the firmest SELinux policy is going to have a hard time preventing the disclosure of that data if the application is coded to do so; Ryan has acknowledged this fact. Any Android user who pays attention knows that even trivial applications tend to ask for combinations of privileges (address book access and network access, for example) which amount to giving away the store. Preventing information leakage through a channel like that - while allowing the application to run as intended - is not straightforward.

So it may be that the "put untrusted applications in a sandbox and limit what they can see" model is as good as it's going to get. As Casey pointed out, applications are, for better or worse, part of the security structure on these devices. If an application has access to resources with security implications, the application must implement any associated security policy. That's a discouraging conclusion for anybody who wants to install arbitrary applications from untrusted sources.

Comments (5 posted)

Brief items

Security quotes of the week

This has not changed since I started working in security in the days when dinosaurs roamed the earth and megabytes were only found on disk drives. We released a Unix variant that we charged $5000 extra for because it had an unprivileged root (using POSIX capabilities) and every customer's first questions was "How do I become Real Root?".
-- Casey Schaufler

So here we are on the cusp of something. At long last, we're finally approaching the critical mass necessary to replace the CA system that we've long since grown out of. But when evaluating replacement models for the CA system, the very first question we should ask is "who do I have to trust, and for how long?" If the answer is "a prescribed set of people, forever" we should probably proceed with extreme caution. I believe that if we don't develop a solution which offers trust agility, we will inevitably find ourselves back in the exact same place that we're currently trying to escape from.
-- Moxie Marlinspike on "trust agility"

It might happen that someday ICANN will create some of these TLDs. There is even talk that they might allow people to register (at a high cost) arbitrary TLDs like .milk or .cookies. In that case, these currently-invalid certificates will become valid because they will suddenly refer to usable internet names. For example, imagine if Microsoft were able to, in the future, register the .microsoft TLD so that they could have www.microsoft for their web site address. As the Observatory shows, an attacker can probably get a CA to sign that name today. Such an attacker would be able to hijack Microsoft's web site on the very minute the new name goes live.
-- Chris Palmer on the EFF Deeplinks blog

Comments (1 posted)

New vulnerabilities

dhcp: man-in-the-middle attack

Package(s):dhcp CVE #(s):CVE-2011-0997
Created:April 7, 2011 Updated:May 31, 2011
Description: From the Slackware advisory:

In dhclient, check the data for some string options for reasonableness before passing it along to the script that interfaces with the OS. This prevents some possible attacks by a hostile DHCP server.

Alerts:
Gentoo 201301-06 dhcp 2013-01-09
Red Hat RHSA-2011:0840-01 dhcp 2011-05-31
SUSE SUSE-SR:2011:008 java-1_6_0-ibm, java-1_5_0-ibm, java-1_4_2-ibm, postfix, dhcp6, dhcpcd, mono-addon-bytefx-data-mysql/bytefx-data-mysql, dbus-1, libtiff/libtiff-devel, cifs-mount/libnetapi-devel, rubygem-sqlite3, gnutls, libpolkit0, udisks 2011-05-03
Ubuntu USN-1108-2 dhcp3 2011-04-19
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
Fedora FEDORA-2011-0848 dhcp 2011-01-28
CentOS CESA-2011:0428 dhcp 2011-04-14
Fedora FEDORA-2011-4897 dhcp 2011-04-06
Ubuntu USN-1108-1 dhcp3 2011-04-11
Mandriva MDVSA-2011:073 dhcp 2011-04-11
Debian DSA-2217-1 dhcp3 2011-04-10
Debian DSA-2216-1 isc-dhcp 2011-04-10
CentOS CESA-2011:0428 dhcp 2011-04-08
openSUSE openSUSE-SU-2011:0321-1 dhcp 2011-04-08
openSUSE openSUSE-SU-2011:0320-1 dhcp 2011-04-08
Red Hat RHSA-2011:0428-01 dhcp 2011-04-08
Slackware SSA:2011-097-01 dhcp 2011-04-07
Pardus 2011-71 dhcp 2011-05-02

Comments (none posted)

ikiwiki: cross-site scripting

Package(s):ikiwiki CVE #(s):CVE-2011-1401
Created:April 11, 2011 Updated:April 22, 2011
Description: From the Debian advisory:

Tango discovered that ikiwiki, a wiki compiler, is not validating if the htmlscrubber plugin is enabled or not on a page when adding alternative stylesheets to pages. This enables an attacker who is able to upload custom stylesheets to add malicious stylesheets as an alternate stylesheet, or replace the default stylesheet, and thus conduct cross-site scripting attacks.

Alerts:
Debian DSA-2214-1 ikiwiki 2011-04-08
Fedora FEDORA-2011-5173 ikiwiki 2011-04-11
Fedora FEDORA-2011-5180 ikiwiki 2011-04-11

Comments (none posted)

kdelibs: HTML injection

Package(s):kdelibs CVE #(s):CVE-2011-1168
Created:April 12, 2011 Updated:May 31, 2011
Description: From the KDE advisory:

When Konqueror cannot fetch a requested URL, it renders an error page with the given URL. If the URL contains JavaScript or HTML code, this code is also rendered, allowing for the user to be tricked into visiting a malicious site or providing credentials to an untrusted party.

Alerts:
SUSE SUSE-SR:2011:010 postfix, libthunarx-2-0, rdesktop, python, viewvc, kvm, exim, logrotate, dovecot12/dovecot20, pure-ftpd, kdelibs4 2011-05-31
Fedora FEDORA-2011-5200 kdebase-workspace 2011-04-12
Fedora FEDORA-2011-5200 libgexiv2 2011-04-12
Fedora FEDORA-2011-5200 kdemultimedia 2011-04-12
Fedora FEDORA-2011-5200 kdeedu 2011-04-12
Fedora FEDORA-2011-5200 pyexiv2 2011-04-12
Fedora FEDORA-2011-5200 kdebindings 2011-04-12
Mandriva MDVSA-2011:075 kdelibs4 2011-04-20
Fedora FEDORA-2011-5183 kdelibs 2011-04-11
Fedora FEDORA-2011-5200 gipfel 2011-04-12
Ubuntu USN-1110-1 kde4libs 2011-04-14
Fedora FEDORA-2011-5200 koffice 2011-04-12
Fedora FEDORA-2011-5200 gpscorrelate 2011-04-12
Slackware SSA:2011-101-02 kdelibs 2011-04-12
Fedora FEDORA-2011-5200 immix 2011-04-12
Fedora FEDORA-2011-5200 gthumb 2011-04-12
Fedora FEDORA-2011-5200 rawstudio 2011-04-12
Fedora FEDORA-2011-5200 kdeadmin 2011-04-12
Fedora FEDORA-2011-5200 krename 2011-04-12
Fedora FEDORA-2011-5200 kdepimlibs 2011-04-12
SUSE SUSE-SR:2011:009 mailman, openssl, tgt, rsync, vsftpd, libzip1/libzip-devel, otrs, libtiff, kdelibs4, libwebkit, libpython2_6-1_0, perl, pure-ftpd, collectd, vino, aaa_base, exim 2011-05-17
Fedora FEDORA-2011-5200 kdesdk 2011-04-12
Fedora FEDORA-2011-5200 qtpfsgui 2011-04-12
Fedora FEDORA-2011-5200 libextractor 2011-04-12
Fedora FEDORA-2011-5200 kdeutils 2011-04-12
Fedora FEDORA-2011-5200 oxygen-icon-theme 2011-04-12
Fedora FEDORA-2011-5200 gnome-commander 2011-04-12
Fedora FEDORA-2011-5200 shotwell 2011-04-12
Fedora FEDORA-2011-5200 geeqie 2011-04-12
Fedora FEDORA-2011-5200 kde-l10n 2011-04-12
Fedora FEDORA-2011-5200 kdeplasma-addons 2011-04-12
Fedora FEDORA-2011-5200 hugin 2011-04-12
Fedora FEDORA-2011-5200 exiv2 2011-04-12
Fedora FEDORA-2011-5200 strigi 2011-04-12
Fedora FEDORA-2011-5200 kdegames 2011-04-12
Fedora FEDORA-2011-5200 kdelibs 2011-04-12
Fedora FEDORA-2011-5200 darktable 2011-04-12
Fedora FEDORA-2011-5200 kdegraphics 2011-04-12
Fedora FEDORA-2011-5200 kdebase-runtime 2011-04-12
openSUSE openSUSE-SU-2011:0480-1 kdelibs4 2011-05-13
Fedora FEDORA-2011-5200 kdetoys 2011-04-12
Fedora FEDORA-2011-5200 ufraw 2011-04-12
Fedora FEDORA-2011-5200 merkaartor 2011-04-12
Fedora FEDORA-2011-5200 kdenetwork 2011-04-12
Fedora FEDORA-2011-5200 kphotoalbum 2011-04-12
Fedora FEDORA-2011-5200 kdeartwork 2011-04-12
Fedora FEDORA-2011-5200 kdebase 2011-04-12
Red Hat RHSA-2011:0464-01 kdelibs 2011-04-21
Fedora FEDORA-2011-5200 kdeaccessibility 2011-04-12

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2011-0695 CVE-2011-0716 CVE-2011-1478
Created:April 8, 2011 Updated:September 13, 2011
Description: From the Red Hat advisory:

A race condition was found in the way the Linux kernel's InfiniBand implementation set up new connections. This could allow a remote user to cause a denial of service. (CVE-2011-0695, Important)

A flaw was found in the way the Linux Ethernet bridge implementation handled certain IGMP (Internet Group Management Protocol) packets. A local, unprivileged user on a system that has a network interface in an Ethernet bridge could use this flaw to crash that system. (CVE-2011-0716, Moderate)

A NULL pointer dereference flaw was found in the Generic Receive Offload (GRO) functionality in the Linux kernel's networking implementation. If both GRO and promiscuous mode were enabled on an interface in a virtual LAN (VLAN), it could result in a denial of service when a malformed VLAN frame is received on that interface. (CVE-2011-1478, Moderate)

Alerts:
SUSE SUSE-SU-2012:0364-1 Real Time Linux Kernel 2012-03-14
Ubuntu USN-1394-1 Linux kernel (OMAP4) 2012-03-07
Ubuntu USN-1387-1 linux-lts-backport-maverick 2012-03-06
Ubuntu USN-1379-1 linux 2012-02-28
openSUSE openSUSE-SU-2012:0206-1 kernel 2012-02-09
SUSE SUSE-SU-2011:1319-2 Linux kernel 2011-12-14
SUSE SUSE-SU-2011:1319-1 Linux kernel 2011-12-13
SUSE SUSE-SA:2011:046 kernel 2011-12-13
Ubuntu USN-1256-1 linux-lts-backport-natty 2011-11-09
Ubuntu USN-1204-1 linux-fsl-imx51 2011-09-13
Ubuntu USN-1202-1 linux-ti-omap4 2011-09-13
Red Hat RHSA-2011:1253-01 kernel-rt 2011-09-12
Ubuntu USN-1187-1 kernel 2011-08-09
Scientific Linux SL-kern-20110715 kernel 2011-07-15
CentOS CESA-2011:0927 kernel 2011-07-18
Red Hat RHSA-2011:0927-01 kernel 2011-07-15
Ubuntu USN-1167-1 linux 2011-07-13
Ubuntu USN-1159-1 linux-mvl-dove 2011-07-13
Ubuntu USN-1162-1 linux-mvl-dove 2011-06-29
Ubuntu USN-1164-1 linux-fsl-imx51 2011-07-06
Ubuntu USN-1160-1 kernel 2011-06-28
Debian DSA-2264-1 linux-2.6 2011-06-18
Ubuntu USN-1146-1 kernel 2011-06-09
Ubuntu USN-1141-1 linux, linux-ec2 2011-05-31
Debian DSA-2240-1 linux-2.6 2011-05-24
Fedora FEDORA-2011-6541 kernel 2011-05-05
CentOS CESA-2011:0429 kernel 2011-04-14
Red Hat RHSA-2011:0429-01 kernel 2011-04-12
Red Hat RHSA-2011:0421-01 kernel 2011-04-07
Ubuntu USN-1111-1 linux-source-2.6.15 2011-05-05
SUSE SUSE-SA:2011:019 kernel 2011-04-28
Red Hat RHSA-2011:0500-01 kernel-rt 2011-05-10
openSUSE openSUSE-SU-2011:0416-1 kernel 2011-04-29
openSUSE openSUSE-SU-2011:0399-1 kernel 2011-04-28

Comments (none posted)

Kernel: two denial of service vulnerabilities

Package(s):kernel CVE #(s):CVE-2011-1010 CVE-2011-1090
Created:April 13, 2011 Updated:September 13, 2011
Description: A missing check in the kernel's Mac OS partition support allows an attacker to cause a kernel oops by mounting a maliciously-crafted filesystem (CVE-2011-1010).

A local user can force a kernel panic by way of access control lists on an NFSv4-mounted filesystem (CVE-2011-1090).

Alerts:
SUSE SUSE-SU-2015:0812-1 kernel 2015-04-30
Oracle ELSA-2013-1645 kernel 2013-11-26
Ubuntu USN-1204-1 linux-fsl-imx51 2011-09-13
Ubuntu USN-1202-1 linux-ti-omap4 2011-09-13
Red Hat RHSA-2011:1253-01 kernel-rt 2011-09-12
Ubuntu USN-1187-1 kernel 2011-08-09
Ubuntu USN-1186-1 kernel 2011-08-09
Ubuntu USN-1183-1 kernel 2011-08-03
Ubuntu USN-1168-1 linux 2011-07-15
Ubuntu USN-1167-1 linux 2011-07-13
Ubuntu USN-1161-1 linux-ec2 2011-07-13
Ubuntu USN-1159-1 linux-mvl-dove 2011-07-13
Ubuntu USN-1162-1 linux-mvl-dove 2011-06-29
SUSE SUSE-SU-2011:0737-1 kernel 2011-07-05
SUSE SUSE-SU-2011:0711-1 kernel 2011-06-29
Ubuntu USN-1160-1 kernel 2011-06-28
Red Hat RHSA-2011:0883-01 kernel 2011-06-21
Debian DSA-2264-1 linux-2.6 2011-06-18
Scientific Linux SL-kern-20110519 kernel 2011-05-19
Ubuntu USN-1141-1 linux, linux-ec2 2011-05-31
Debian DSA-2240-1 linux-2.6 2011-05-24
SUSE SUSE-SA:2011:017 kernel 2011-04-18
openSUSE openSUSE-SU-2011:0346-1 kernel 2011-04-18
CentOS CESA-2011:0429 kernel 2011-04-14
Red Hat RHSA-2011:0429-01 kernel 2011-04-12
SUSE SUSE-SA:2011:019 kernel 2011-04-28
Red Hat RHSA-2011:0500-01 kernel-rt 2011-05-10
openSUSE openSUSE-SU-2011:0416-1 kernel 2011-04-29
Red Hat RHSA-2011:0542-01 kernel 2011-05-19
SUSE SUSE-SA:2011:026 kernel 2011-05-20
openSUSE openSUSE-SU-2011:0399-1 kernel 2011-04-28

Comments (none posted)

libvirt: denial of service

Package(s):libvirt CVE #(s):CVE-2011-1486
Created:April 8, 2011 Updated:August 4, 2011
Description: From the openSUSE advisory:

libvirtd could mix errors from several threads leading to a crash

Alerts:
Gentoo 201202-07 libvirt 2012-02-27
Debian DSA-2280-1 libvirt 2011-07-19
Ubuntu USN-1152-1 libvirt 2011-06-16
Pardus 2011-102 libvirt 2011-08-04
openSUSE openSUSE-SU-2011:0578-1 xen 2011-06-01
openSUSE openSUSE-SU-2011:0580-1 xen 2011-06-01
Red Hat RHSA-2011:0478-01 libvirt 2011-05-02
Fedora FEDORA-2011-4870 libvirt 2011-04-06
Fedora FEDORA-2011-4896 libvirt 2011-04-06
openSUSE openSUSE-SU-2011:0317-1 libvirt 2011-04-08
CentOS CESA-2011:0478 libvirt 2011-05-04
Red Hat RHSA-2011:0479-01 libvirt 2011-05-02

Comments (none posted)

moonlight: multiple vulnerabilities

Package(s):moonlight CVE #(s):CVE-2011-0989 CVE-2011-0990 CVE-2011-0991 CVE-2011-0992
Created:April 8, 2011 Updated:April 19, 2011
Description: From the openSUSE advisory:

CVE-2011-0989: modification of read-only values via RuntimeHelpers.InitializeArray

CVE-2011-0990: buffer overflow due to race condition in in Array.FastCopy

CVE-2011-0991: use-after-free due to DynamicMethod resurrection

CVE-2011-0992: information leak due to improper thread finalization

Alerts:
Ubuntu USN-2547-1 mono 2015-03-24
Gentoo 201206-13 mono, mono-debugger 2012-06-21
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
openSUSE openSUSE-SU-2011:0313-1 moonlight 2011-04-08

Comments (none posted)

php: symlink attack

Package(s):php CVE #(s):CVE-2011-0441
Created:April 8, 2011 Updated:May 5, 2011
Description: From the Mandriva advisory:

It was discovered that the /etc/cron.d/php cron job for php-session allows local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php.

Alerts:
Ubuntu USN-1358-1 php5 2012-02-09
Ubuntu USN-1126-2 php5 2011-05-05
Ubuntu USN-1126-1 php5 2011-04-29
Mandriva MDVSA-2011:069 php 2011-04-08

Comments (none posted)

php: denial of service

Package(s):php CVE #(s):CVE-2011-1148
Created:April 8, 2011 Updated:February 13, 2012
Description: From the Pardus advisory:

CVE-2011-1148: Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.

Alerts:
Oracle ELSA-2012-1046 php 2012-06-30
Mandriva MDVSA-2012:071 php 2012-05-10
Debian DSA-2408-1 php5 2012-02-13
Scientific Linux SL-php-20120119 php 2012-01-19
Oracle ELSA-2012-0033 php 2012-01-18
CentOS CESA-2012:0033 php 2012-01-18
Red Hat RHSA-2012:0033-01 php 2012-01-18
Oracle ELSA-2011-1423 php53/php 2011-11-03
Oracle ELSA-2011-1423 php53/php 2011-11-03
Scientific Linux SL-NotF-20111102 php53/php 2011-11-02
Mandriva MDVSA-2011:165 php 2011-11-03
CentOS CESA-2011:1423 php53 2011-11-03
Red Hat RHSA-2011:1423-01 php53/php 2011-11-02
Gentoo 201110-06 php 2011-10-10
Fedora FEDORA-2011-11537 maniadrive 2011-08-26
Fedora FEDORA-2011-11528 maniadrive 2011-08-26
Fedora FEDORA-2011-11537 php-eaccelerator 2011-08-26
Fedora FEDORA-2011-11528 php-eaccelerator 2011-08-26
Fedora FEDORA-2011-11537 php 2011-08-26
Fedora FEDORA-2011-11528 php 2011-08-26
Slackware SSA:2011-237-01 php 2011-08-25
openSUSE openSUSE-SU-2011:0645-1 php5 2011-06-16
Pardus 2011-63 mod_php php-cli php-common 2011-04-07
Ubuntu USN-1126-1 php5 2011-04-29
Ubuntu USN-1126-2 php5 2011-05-05

Comments (none posted)

python-feedparser: multiple vulnerabilities

Package(s):python-feedparser CVE #(s):CVE-2009-5065 CVE-2011-1156 CVE-2011-1157 CVE-2011-1158
Created:April 8, 2011 Updated:August 20, 2012
Description: From the openSUSE advisory:

Various issues in python-feedparser have been fixed, including fixes for crashes due to missing input sanitization and a XSS vulnerability. CVE-2011-1156, CVE-2011-1157, CVE-2011-1158 and CVE-2009-5065 have been assigned to these issues.

Alerts:
Fedora FEDORA-2012-11668 python-djblets 2012-08-18
Fedora FEDORA-2012-11576 python-djblets 2012-08-18
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
openSUSE openSUSE-SU-2011:0314-1 python-feedparser 2011-04-08
Fedora FEDORA-2011-4911 python-feedparser 2011-04-06
Fedora FEDORA-2011-4894 python-feedparser 2011-04-06
Mandriva MDVSA-2011:082 python-feedparser 2011-05-02

Comments (none posted)

rsyslog: multiple vulnerabilities

Package(s):rsyslog CVE #(s):CVE-2011-1488 CVE-2011-1489 CVE-2011-1490
Created:April 12, 2011 Updated:April 19, 2011
Description: From the openSUSE advisory:

rsyslog was updated to version 5.6.5 to fix a number of memory leaks that could crash the syslog daemon (CVE-2011-1488, CVE-2011-1489, CVE-2011-1490).

Alerts:
SUSE SUSE-SR:2011:007 NetworkManager, OpenOffice_org, apache2-slms, dbus-1-glib, dhcp/dhcpcd/dhcp6, freetype2, kbd, krb5, libcgroup, libmodplug, libvirt, mailman, moonlight-plugin, nbd, openldap2, pure-ftpd, python-feedparser, rsyslog, telepathy-gabble, wireshark 2011-04-19
openSUSE openSUSE-SU-2011:0326-1 rsyslog 2011-04-12

Comments (none posted)

shadow: denial of service

Package(s):shadow CVE #(s):
Created:April 11, 2011 Updated:April 13, 2011
Description: From the Slackware advisory:

Corrected a packaging error where incorrect permissions on /usr/sbin/lastlog and /usr/sbin/faillog allow any user to set login failure limits on any other user (including root), potentially leading to a denial of service. Thanks to pyllyukko for discovering and reporting this vulnerability.

Alerts:
Slackware SSA:2011-101-01 shadow 2011-04-11

Comments (none posted)

spice-xpi: multiple vulnerabilities

Package(s):spice-xpi CVE #(s):CVE-2011-0012 CVE-2011-1179
Created:April 8, 2011 Updated:April 15, 2011
Description: From the Red Hat advisory:

An uninitialized pointer use flaw was found in the SPICE Firefox plug-in. If a user were tricked into visiting a malicious web page with Firefox while the SPICE plug-in was enabled, it could cause Firefox to crash or, possibly, execute arbitrary code with the privileges of the user running Firefox. (CVE-2011-1179)

It was found that the SPICE Firefox plug-in used a predictable name for one of its log files. A local attacker could use this flaw to conduct a symbolic link attack, allowing them to overwrite arbitrary files accessible to the user running Firefox. (CVE-2011-0012)

Alerts:
CentOS CESA-2011:0427 spice-xpi 2011-04-14
Red Hat RHSA-2011:0427-01 spice-xpi 2011-04-07
Red Hat RHSA-2011:0426-01 spice-xpi 2011-04-07

Comments (none posted)

tmux: privilege escalation

Package(s):tmux CVE #(s):CVE-2011-1496
Created:April 8, 2011 Updated:April 19, 2011
Description: From the Debian advisory:

Daniel Danner discovered that tmux, a terminal multiplexer, is not properly dropping group privileges. Due to a patch introduced by Debian, when invoked with the -S option, tmux is not dropping permissions obtained through its setgid installation.

Alerts:
Fedora FEDORA-2011-5156 tmux 2011-04-10
Fedora FEDORA-2011-5167 tmux 2011-04-10
Debian DSA-2212-1 tmux 2011-04-07

Comments (none posted)

vlc: arbitrary code execution

Package(s):vlc CVE #(s):CVE-2010-3275 CVE-2010-3276
Created:April 7, 2011 Updated:April 13, 2011
Description: From the CVE entries:

libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an AMV file, related to a "dangling pointer vulnerability." (CVE-2010-3275)

libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an NSV file. (CVE-2010-3276)

Alerts:
Gentoo 201411-01 vlc 2014-11-05
Debian DSA-2211-1 vlc 2011-04-06

Comments (none posted)

vlc: arbitrary code execution

Package(s):vlc CVE #(s):
Created:April 12, 2011 Updated:April 13, 2011
Description: From the Debian advisory:

Aliz Hammond discovered that the MP4 decoder plugin of vlc, a multimedia player and streamer, is vulnerable to a heap-based buffer overflow. This has been introduced by a wrong data type being used for a size calculation. An attacker could use this flaw to trick a victim into opening a specially crafted MP4 file and possibly execute arbitrary code or crash the media player.

Alerts:
Debian DSA-2218-1 vlc 2011-04-12

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2011, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds