|
|
Log in / Subscribe / Register

Security

Code authenticity checking

By Nathan Willis
May 1, 2013

Cryptographically signed binary packages are mainstay of modern Linux distributions, used for verifying packages against both tampering and accidental corruption. But as ever fewer users need to compile their software from source, it is possible to forget that verifying the authenticity and integrity of binary packages depends first on the packagers' ability to verify the upstream source code. In April, Allan McRae posted an entry on his blog that looked at the verifiability of the source code releases made by a number of well-known projects, with less-than-perfect results.

McRae is a core Arch Linux developer, and he undertook his verifiability survey because Arch's packaging tool makepkg recently gained support for checking the PGP signatures of source files. Naturally, such verification is only possible when the source bundle includes a PGP signature, but McRae also looked at four other interrelated factors: whether or not the signing key can be easily verified as authentic, whether checksums for the source files are available, whether the checksums are signed, and whether the checksums are available on a different server than the one hosting the source files. This last criterion is a guard against a server compromise; if an attacker can replace the source files, he or she can also replace the checksum with one that matches the replacement source.

To provide a meaningful sample population for his survey, McRae looked at 63 "core" packages common to most Linux distributions. "For me, that basically means the packages required to build a fairly minimal booting system. This is essentially the package list from Linux From Scratch with a few additions that I see as needed …" His results are presented in a color-coded table; green cells indicate that a package meets all of the verification criteria, red indicates that no verification criteria pass, and yellow indicate some but not all criteria are met. Of the 63 packages examined, ten offered no means of verification and 14 others offered only partial verification.

The packages offering no verification mechanism are file, flex, iana-etc, isl, kbd, libarchive, pkg-config, procps, psmisc, and which. Those packages that partially meet the measured criteria fall into two basic categories, those that provide PGP signatures but have a difficult-to-verify key (gawk, groff, patch, sed, sudo, sysvinit, texinfo, and xz), and those that provide their checksum data on the same server as their files (bzip2, perl, tzdata, and zlib). In addition, gmp and less fell somewhere in between, providing a PGP signature, but making the public key or key ID available only on the same server as the source release.

To be sure, McRae's specific criteria and red/yellow/green assessments draw some rather arbitrary lines—as he observes, several of the projects have other means of verification available, and he admits that the definition of a "readily verifiable" key includes keys signed by keys that he trusts. But the aggregate picture is the important one: most of the packages are green (which is good news), but roughly 15% of them offer no source verification whatsoever (which is far from good). He also notes that the picture seems to rapidly deteriorate "as you move further away from this core subset of packages needed for a fairly standard Linux system".

Best practices

McRae's post was picked up on the oss-security mailing list, where the talk turned to how to establish a set of common guidelines for releasing source code with verifiable authenticity. Alan Coopersmith commented that X.org has received complaints asking it to do more, but without concrete suggestions. "If there was a common standard, with instructions, we'd be far more likely to spend the time to adopt it, than just a 'make signatures appear somewhere, in an unspecified format'". Eric H. Christensen concurred, saying he was interested in establishing a "best practices" recommendation for Red Hat—but, he asked, what really constitutes the best way to disseminate releases? A recommendation would advise against using MD5 for checksumming, he said, and although he favors PGP for signatures, perhaps it has its drawbacks as well.

Indeed, Alistair Crooks replied with a lengthy list of questions one might ask about a PGP-signed release, addressing everything from the key management practices employed by the signing entity to the options specified when generating the key itself (such as whether it is an RSA or DSA key and whether or not it requires a passphrase). A PGP signature proves only that a person with access to the signing key attests that the signed message had a particular value at a particular time, he argued, which does not provide much authentication:

So, all in all, what you have is a digest, signed by someone who knows the key, or who has access to the creds (if any) for the key, or who has found out the key creds, albeit with timestamp info for when the signature took place.

I'm not sure what using PGP gains us?

But the majority seemed to feel that PGP in fact provides quite a few gains. Nicolas Vigier and Florian Weimer both commented that key-continuity over multiple releases safeguards against a man-in-the-middle attacker replacing a release. Weimer noted that "hosting sites have been compromised, or serve their content exclusively over a mirror network which literally anyone can join." Kurt Seifried agreed, but acknowledged that the "real problem" with PGP is the cost of implementing it:

Key creation/storage/management/backup/etc is all non trivial and not free. Is the cost of this worth it?

I think if we are going to push this we need to come up with a pretty good set of guidelines that are easy to follow and implement.

Daniel Kahn Gillmor responded that even a simple "the release manager has the OpenPGP key for the project on the keyring of her personal development machine" workflow raises the bar for would-be attackers and would constitute an improvement for the numerous projects that do not currently sign their releases at all. But he still advocated producing guidelines:

I don't want us to spec out a byzantine ruleset that would put people off from *starting* to sign their releases. Maybe such a policy could break out the sophisticated stuff into the form of "baseline", "level 1", "level 2", etc.

That way we could encourage all projects to get to the "baseline" (which should be short and simple) without requiring them to "level up" right away (to offline key storage, key transition statements, etc).

He pointed to the existing OpenPGP best practices page at the Debian Grimoire wiki as an example.

For his part, McRae had comparatively simple goals in mind:

Despite PGPs limitations, what I really like to see when a release is made is a PGP signed release announcement email to the relevant mailing list with decent checksums and the file size in it. Bonus points if that email gets mirrored or at least archived on a different server than the source code. I figure for most open source software, a false release email would be spotted fairly quickly...

Identity cleft

Although a general consensus developed around the idea of crafting a "best practices" recommendation, Crooks's questions about the limitations of PGP signatures raised some valuable points—such as the importance of distinguishing between identity and trust. Some mistook his original email for a call to ditch PGP signatures on source releases, since they do not offer absolute security, but Crooks said that was a misinterpretation. "It's a bit disappointing that my advice (in pointing out ways that PGP can be worked around in order to diminish integrity and security) was categorised as an attack on PGP itself - I shall take that as a reminder that I should be more clear in what I write." Rather, he said, he hoped to "warn against the magic 'it's signed, so it's gospel' myth by pointing out the problems of key management."

The crux of Crooks's argument is that a PGP signature should not be trusted just because it is associated with a known identity (person or team of developers). As he elaborated in one message in the ensuing thread:

I don't know if you've ever done one of the key signing parties, where you get handed government id, and that is supposed to define someone's identity. It tells age, name, and ability to keep a dead pan face in front of a camera. It says nothing about how trust-worthy someone is, in the sense that I would compile/run software written by them.

Elsewhere in the same message, he noted:

I know lots of people who write software. Some of their personal lives are train wrecks. Some I wouldn't trust to sit the right way on a toilet seat. But, for various reasons, such as mentoring, peer-programming, peer review, stringent regression tests, personal audits of their work, or because of random audits, etc, I would trust the software they write.

In essence, this is an argument that the signer only earns trust by demonstrating their reliability over time. For individuals, the issue might be the quality of the software (as Crooks discussed above), but to trust the signature on a project's releases, more stringent requirements may be necessary. As he added later: "You actually know very little about the key before and after the signing took place; so you have no way of ascertaining whether the key has been used to sign other things fraudulently."

Add in Crooks's earlier questions about the key options and security on the machines used to sign releases, and proper key management, it would seem, remains an area where there is still work to be done. Crooks did reiterate his support for encouraging PGP signatures on all source releases; he simply cautioned that blind trust in the presence of a signature can lead to a false sense of security.

Then again, a campaign to persuade more upstream software projects to integrate easily-verified PGP signatures and out-of-band checksums into their release process has to start somewhere. There are practical challenges to consider, such as the role that popular hosting providers play in the build and release processes (Stuart Henderson noted that Github and Bitbucket dynamically generate tar archives, which complicates signing releases).

But convincing individual developers and release managers might be the best way to convince hosting services to adapt. Presumably few people enjoy seeing their project marked with the red "No verification available" label. It would certainly be informative to conduct a large-scale examination of McRae's criteria on other popular open source projects. Just over 38% of the core packages McRae examined could not be "readily validated"—a sizable minority, but a minority nonetheless; that gives one hope that the community in general takes source verifiability as a matter worth addressing.

Comments (11 posted)

Brief items

Security quotes of the week

Chase is committed to making your banking experience enjoyable, trouble-free, and, above all, safe. Which is why you should strike your computer with 20 to 25 forceful blows from a pipe wrench as soon as you reach international waters, toss the plastic and metal shards into the sea, and then immediately sink the ship you’re on. And then, once you dive to the sea floor, grab the scattered computer pieces, and shove them all inside living clams, you’ll be able to rest easy knowing you’re banking smarter and safer.
The Onion (hat tip to Don Marti)

Patent trolls know this and as a result, they sue companies in droves and make settlement demands designed to maximize their financial take while making it cheaper and less painful to settle than to devote the resources necessary to defeat their claims. The current system lets them do so even with claims that are unlikely to prevail on the merits. That is because, whether win lose or draw, the rules effectively insulate trolls from negative consequences except perhaps a lower return than expected from any given company in any given case. They can sue on tenuous claims and still come out ahead. And so the broken system with its attendant leverage allows trolls to extract billions in blackmail from U.S. companies and, in the final analysis, consumers.
Barnes & Noble pulls no punches (by way of Groklaw)

In the aftermath of the Boston bombings -- cameras were everywhere there -- which while horrendous and tragic, killed and injured fewer people than just a few days of "routine" gun violence here in the USA, we're hearing the predictable calls for vastly expanded government-operated video surveillance networks, even though virtually every study shows that while these systems may be useful in solving crimes after the fact, they are of little to no use in preventing crime or terrorism in the first place. This has proven true even in cities like London, where there's a camera focused on pretty much every individual pimple on each Londoner's face.

In some cities, like New York, the surveillance-industrial complex has its fangs deeply into government for the big bucks. It's there we heard the Police Commissioner -- just hours ago, really -- claim that "privacy is off the table."

Lauren Weinstein

Comments (15 posted)

Mozilla: Protecting our brand from a global spyware provider

The Mozilla blog reports that Mozilla is using its trademarks to back up a cease-and-desist letter to Gamma International, the maker of the infamous FinFisher surveillance system. "We cannot abide a software company using our name to disguise online surveillance tools that can be – and in several cases actually have been – used by Gamma’s customers to violate citizens’ human rights and online privacy."

Comments (1 posted)

New vulnerabilities

clamav: multiple vulnerabilities

Package(s):clamav CVE #(s):CVE-2013-2020 CVE-2013-2021
Created:April 30, 2013 Updated:June 21, 2013
Description: From the clamav bug tracker entries [1, 2]:

Bug was in handling of UPX-packed executables. When checking for a skewed offset section, it would not rule out a possible skew value that was larger than the size of the PE section. Because of unsigned math, it would cause the resulting expected section size to rollover to exceedingly large values and try inappropriate heap reads.

Problem was in handling of encrypted PDF's. A specially crafted PDF could set a user-controlled length which is then used to allocate heap memory and then read length bytes off of the stack, potentially beyond the size of a static array.

Alerts:
SUSE SUSE-SU-2014:1571-1 clamav 2014-12-05
Gentoo 201405-08 clamav 2014-05-16
Fedora FEDORA-2013-10953 clamav 2013-06-21
Fedora FEDORA-2013-10980 clamav 2013-06-21
openSUSE openSUSE-SU-2013:0813-2 clamav 2013-05-21
openSUSE openSUSE-SU-2013:0813-1 clamav 2013-05-21
Fedora FEDORA-2013-8047 clamav 2013-05-16
Ubuntu USN-1816-1 clamav 2013-05-03
Mageia MGASA-2013-0132 clamav 2013-05-02
Mandriva MDVSA-2013:159 clamav 2013-04-30
openSUSE openSUSE-SU-2013:0883-1 clamav 2013-06-10
openSUSE openSUSE-SU-2013:0881-1 clamav 2013-06-10

Comments (none posted)

glibc: denial of service

Package(s):glibc CVE #(s):CVE-2013-1914
Created:April 25, 2013 Updated:August 22, 2013
Description:

From the Red Hat advisory:

It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash. (CVE-2013-1914)

Alerts:
Debian-LTS DLA-165-1 eglibc 2015-03-06
Gentoo 201503-04 glibc 2015-03-08
Scientific Linux SLSA-2013:1605-2 glibc 2013-12-03
Mageia MGASA-2013-0340 glibc 2013-11-22
Oracle ELSA-2013-1605 glibc 2013-11-26
Mandriva MDVSA-2013:284 glibc 2013-11-25
Mandriva MDVSA-2013:283 glibc 2013-11-25
Red Hat RHSA-2013:1605-02 glibc 2013-11-21
Ubuntu USN-1991-1 eglibc 2013-10-21
openSUSE openSUSE-SU-2013:1510-1 glibc 2013-09-30
Fedora FEDORA-2013-15053 glibc 2013-08-22
Mageia MGASA-2013-0141 glibc 2013-05-09
Mandriva MDVSA-2013:163 glibc 2013-05-07
Mandriva MDVSA-2013:162 glibc 2013-05-07
Scientific Linux SL-glib-20130425 glibc 2013-04-25
Oracle ELSA-2013-0769 glibc 2013-04-25
CentOS CESA-2013:0769 glibc 2013-04-24
Red Hat RHSA-2013:0769-01 glibc 2013-04-24

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2013-3228 CVE-2013-3230 CVE-2013-3231 CVE-2013-3232 CVE-2013-3233 CVE-2013-3234 CVE-2013-3076 CVE-2013-3223 CVE-2013-3225 CVE-2013-1979 CVE-2013-3224 CVE-2013-3222
Created:April 29, 2013 Updated:July 19, 2013
Description: From the Red Hat bugzilla entries:

[CVE-2013-3228]: Linux kernel built with the Asynchronous Transfer Mode(ATM) support is vulnerable to an information leakage flaw. It occurs when doing recvmsg(2) calls on the ATM PVC & SVC sockets.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3224]: Linux kernel built with Bluetooth networking support is vulnerable to an information leakage flaw. This occurs while receiving messages via recvmsg call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-1979]: Commit 257b5358b32f ("scm: Capture the full credentials of the scm sender") changed the credentials passing code to pass in the effective uid/gid instead of the real uid/gid.

Obviously this doesn't matter most of the time (since normally they are the same), but it results in differences for suid binaries when the wrong uid/gid ends up being used.

An unprivileged local user could use this flaw to elevate their privileges.

[CVE-2013-3225]: Linux kernel built with Bluetooth networking with RFCOMM protocol support is vulnerable to an information leakage flaw. This occurs while receiving messages via recvmsg call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3223]: Linux kernel built with the Amateur Radio support(CONFIG_HAMRADIO) along with the Amateur Radio AX.25 Level 2 protocol support enabled is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3076]: Linux kernel built with the User-space interface for hash algorithms (CONFIG_CRYPTO_USER_API_HASH) and User-space interface for symmetric key cipher algorithms (CONFIG_CRYPTO_USER_API_SKCIPHER) support is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3234]: Linux kernel built with the ROSE virtual network devices (CONFIG_ROSE) support is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3233]: Linux kernel built with the Near Field Communication(CONFIG_NFC) subsystem along with the Logical Link Control Protocol(CONFIG_NFC_LLCP) support is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3232]: Linux kernel built with the NETROM virtual network devices (CONFIG_NETROM) support are vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) socket call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3231]: Linux kernel built with Logical Link layer Control(CONFIG_LLC) protocol support is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) socket call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3230]: Linux kernel built with the Layer Two Tunneling Protocol (CONFIG_L2TP) support is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) call.

A user/program could use this flaw to leak kernel memory bytes.

[CVE-2013-3228]: Linux kernel built with the The Infrared Data Associations (CONFIG_IRDA) protocol is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) socket call.

A user/program could use this flaw to leak kernel memory bytes.

Alerts:
SUSE SUSE-SU-2014:1316-1 Linux kernel 2014-10-22
SUSE SUSE-SU-2014:1319-1 Linux kernel 2014-10-23
SUSE SUSE-SU-2014:0536-1 Linux kernel 2014-04-16
openSUSE openSUSE-SU-2013:1971-1 kernel 2013-12-30
Scientific Linux SLSA-2013:1645-2 kernel 2013-12-16
Oracle ELSA-2013-2584 kernel 2013-11-28
Oracle ELSA-2013-2584 kernel 2013-11-28
Oracle ELSA-2013-2585 kernel 2013-11-28
Oracle ELSA-2013-2585 kernel 2013-11-28
Red Hat RHSA-2013:1645-02 kernel 2013-11-21
Oracle ELSA-2013-1645 kernel 2013-11-26
Oracle ELSA-2013-2538 kernel 2013-07-18
Oracle ELSA-2013-2538 kernel 2013-07-18
Oracle ELSA-2013-2537 kernel 2013-07-18
Oracle ELSA-2013-2537 kernel 2013-07-18
Scientific Linux SL-kern-20130717 kernel 2013-07-17
Oracle ELSA-2013-1051 kernel 2013-07-16
CentOS CESA-2013:1051 kernel 2013-07-17
Red Hat RHSA-2013:1080-01 kernel 2013-07-16
Red Hat RHSA-2013:1051-01 kernel 2013-07-16
Oracle ELSA-2013-1034 kernel 2013-07-10
CentOS CESA-2013:1034 kernel 2013-07-10
SUSE SUSE-SU-2013:1182-2 Linux kernel 2013-07-12
Scientific Linux SL-kern-20130710 kernel 2013-07-10
Red Hat RHSA-2013:1034-01 kernel 2013-07-10
Oracle ELSA-2013-2546 enterprise kernel 2013-09-17
Mandriva MDVSA-2013:176 kernel 2013-06-24
Oracle ELSA-2013-2546 enterprise kernel 2013-09-17
SUSE SUSE-SU-2013:1022-3 Linux kernel 2013-06-18
SUSE SUSE-SU-2013:1022-2 Linux kernel 2013-06-17
SUSE SUSE-SU-2013:1022-1 kernel 2013-06-17
Ubuntu USN-1883-1 linux-ti-omap4 2013-06-14
Ubuntu USN-1882-1 linux-ti-omap4 2013-06-14
Ubuntu USN-1881-1 linux 2013-06-14
Ubuntu USN-1880-1 linux-lts-quantal 2013-06-14
Ubuntu USN-1879-1 linux-ti-omap4 2013-06-14
Ubuntu USN-1878-1 linux 2013-06-14
Ubuntu USN-1877-1 linux-ec2 2013-06-14
Ubuntu USN-1876-1 linux 2013-06-14
Oracle ELSA-2013-2525 kernel 2013-06-13
Oracle ELSA-2013-2525 kernel 2013-06-13
Ubuntu USN-1839-1 linux-ti-omap4 2013-05-28
Ubuntu USN-1833-1 linux 2013-05-24
Ubuntu USN-1837-1 linux 2013-05-24
Red Hat RHSA-2013:0829-01 kernel-rt 2013-05-20
Mageia MGASA-2013-01451 kernel-vserver 2013-05-17
Mageia MGASA-2013-0150 kernel-rt 2013-05-17
Mageia MGASA-2013-0149 kernel-tmb 2013-05-17
Mageia MGASA-2013-0148 kernel-linus 2013-05-17
Mageia MGASA-2013-0147 kernel 2013-05-17
Debian DSA-2669-1 linux 2013-05-15
Debian DSA-2668-1 linux-2.6 2013-05-14
Fedora FEDORA-2013-6999 kernel 2013-05-04
Ubuntu USN-1815-1 kernel 2013-05-02
Fedora FEDORA-2013-6537 kernel 2013-04-27

Comments (none posted)

libxml2: multiple unspecified vulnerabilities

Package(s):libxml2 CVE #(s):CVE-2013-1969
Created:April 25, 2013 Updated:June 11, 2013
Description: The libxml2 2.9.1 release apparently fixes multiple vulnerabilities, but nobody is saying exactly what they are.

Thanks to David Walser, we now know that one of the vulnerabilities mentioned by Fedora is a "use after free" that has been assigned CVE-2013-1969.

Alerts:
Gentoo 201412-11 emul-linux-x86-baselibs 2014-12-11
Gentoo 201311-06 libxml2 2013-11-10
Ubuntu USN-1817-1 libxml2 2013-05-07
openSUSE openSUSE-SU-2013:0729-1 libxml2 2013-04-30
Fedora FEDORA-2013-6147 libxml2 2013-04-25
Fedora FEDORA-2013-6110 libxml2 2013-04-25
openSUSE openSUSE-SU-2013:0945-1 libxml2 2013-06-10

Comments (none posted)

mantis: two vulnerabilities

Package(s):mantis CVE #(s):CVE-2013-1930 CVE-2013-1931
Created:April 25, 2013 Updated:August 5, 2013
Description:

From the Red Hat bugzilla entries [1, 2]:

CVE-2013-1930: A security flaw was found in the way MantisBT, a web-based issue tracking system, performed user-privilege check when displaying issue close button (close button was previously shown at a web page even when 'close' was not a valid status by / according to workflow definition). An unprivileged MantisBT user could use this flaw to close particular issue even though the particular workflow settings did not permit it.

CVE-2013-1931: A cross-site scripting (XSS) flaw was found in the way MantisBT, a web-based issue tracking system, sanitized content of the version name, when deleting a project version. A remote attacker could provide a specially-crafted URL that, when visited would lead to arbitrary HTML or web script execution in the context of the MantisBT user's session.

Alerts:
Fedora FEDORA-2014-15079 mantis 2014-12-12
Fedora FEDORA-2013-5801 mantis 2013-08-04
Fedora FEDORA-2013-5829 mantis 2013-04-25
Fedora FEDORA-2013-5833 mantis 2013-04-25

Comments (none posted)

mediawiki: multiple vulnerabilities

Package(s):mediawiki CVE #(s):CVE-2013-1951
Created:April 30, 2013 Updated:May 1, 2013
Description: From the Red Hat bugzilla:

Three flaws were corrected in the recently-released MediaWiki 1.20.4 and 1.19.5 releases:

* An internal review discovered that specially crafted Lua function names could lead to cross-site scripting. MediaWiki bug 46084

* Daniel Franke reported that during SVG parsing, MediaWiki failed to prevent XML external entity (XXE) processing. This could lead to local file disclosure, or potentially remote command execution in environments that have enabled expect:// handling. MediaWiki bug 46859

* Internal review also discovered that Special:Import, and Extension:RSS failed to prevent XML external entity (XXE) processing. MediaWiki bug 47251

CVE-2013-1951 was assigned to the first issue (the XSS), the other two do not have CVEs assigned as per a discussion on oss-sec.

Alerts:
Gentoo 201310-21 mediawiki 2013-10-28
Fedora FEDORA-2013-5874 mediawiki 2013-04-25
Fedora FEDORA-2013-6170 mediawiki 2013-04-30
Fedora FEDORA-2013-6171 mediawiki 2013-04-30

Comments (none posted)

mysql: multiple vulnerabilities

Package(s):mysql-5.5 CVE #(s):CVE-2012-0553 CVE-2013-1492 CVE-2013-1623
Created:April 26, 2013 Updated:May 1, 2013
Description:

From the Ubuntu issue tracker:

Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492. (CVE-2012-0553)

Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553. (CVE-2013-1492)

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169. (CVE-2013-1623)

Alerts:
Gentoo 201308-06 mysql 2013-08-29
Gentoo GLSA 201308-06:02 mysql 2013-08-30
Ubuntu USN-1807-2 mysql-5.5 2013-04-25

Comments (none posted)

pdns-recursor: ghost domain name resolving flaw

Package(s):pdns-recursor CVE #(s):CVE-2012-1193
Created:May 1, 2013 Updated:May 1, 2013
Description: From the CVE entry:

The resolver in PowerDNS Recursor (aka pdns_recursor) 3.3 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.

Alerts:
Gentoo 201412-33 pdns-recursor 2014-12-22
Fedora FEDORA-2013-6316 pdns-recursor 2013-05-01
Fedora FEDORA-2013-6279 pdns-recursor 2013-05-01

Comments (none posted)

php-twig-Twig: file disclosure

Package(s):php-twig-Twig CVE #(s):
Created:April 29, 2013 Updated:May 1, 2013
Description: From the Twig advisory:

Your application is affected if you are using Twig_Loader_Filesystem for loading Twig templates but only if you are using non-trusted template names (names provided by a end-user for instance).

When affected, it is possible to go up one directory for the paths configured in your loader.

For instance, if the filesystem loader is configured with /path/to/templates as a path to look for templates, you can force Twig to include a file stored in /path/to by prepending the path with /../ like in {% include "/../somefile_in_path_to" %}

Note that using anything else (like ../somefile, /../../somefile, or ../../somefile) won’t work and you will get a proper exception.

Alerts:
Fedora FEDORA-2013-6107 php-twig-Twig 2013-04-27
Fedora FEDORA-2013-6114 php-twig-Twig 2013-04-27

Comments (none posted)

qemu: host file disclosure

Package(s):qemu CVE #(s):CVE-2013-1922
Created:April 25, 2013 Updated:May 3, 2013
Description:

From the Red Hat bugzilla entry:

A security flaw was found in the way qemu-nbd, the QEMU Disk Network Block Device server tool of QEMU, performed detection of image formats (the image format has been previously autodetected). A guest operating system administrator could write a header to particular raw disk image format, describing another format than original one for that disk image, leading to scenario in which after restart of that guest, QEMU would detect new format of the image, and could allow the guest to read any file on the host if QEMU was sufficiently privileged.

Alerts:
Gentoo 201309-24 xen 2013-09-27
openSUSE openSUSE-SU-2013:1404-1 xen 2013-09-04
Mageia MGASA-2013-0134 qemu 2013-05-02
Fedora FEDORA-2013-6211 qemu 2013-04-30
Fedora FEDORA-2013-6221 qemu 2013-04-26
Fedora FEDORA-2013-6185 qemu 2013-04-25

Comments (none posted)

strongswan: authentication bypass

Package(s):strongswan CVE #(s):CVE-2013-2944
Created:April 30, 2013 Updated:June 11, 2013
Description: From the Debian advisory:

Kevin Wojtysiak discovered a vulnerability in strongSwan, an IPsec based VPN solution.

When using the openssl plugin for ECDSA based authentication, an empty, zeroed or otherwise invalid signature is handled as a legitimate one. An attacker could use a forged signature to authenticate like a legitimate user and gain access to the VPN (and everything protected by this).

While the issue looks like CVE-2012-2388 (RSA signature based authentication bypass), it is unrelated.

Alerts:
Gentoo 201309-02 strongswan 2013-09-01
openSUSE openSUSE-SU-2013:0873-1 strongswan 2013-06-10
openSUSE openSUSE-SU-2013:0774-1 strongswan 2013-05-10
openSUSE openSUSE-SU-2013:0775-1 strongswan 2013-05-10
Debian DSA-2665-1 strongswan 2013-04-30
openSUSE openSUSE-SU-2013:0985-1 strongswan 2013-06-10

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds