|
|
Subscribe / Log in / New account

Security

Tizen's new access-control broker "Cynara"

By Nathan Willis
June 11, 2014

TDC 2014

Like all computing platforms that allow users to install arbitrary applications, the Tizen project has expended considerable effort designing its security framework. At the 2014 Tizen Developer Conference (TDC), Casey Schaufler and Tomasz Świerczek presented a talk on the latest iteration of Tizen's application-security design, which introduces a privilege-checking service called Cynara.

The fundamental problem that Tizen faces in application security, Schaufler said, is that privileges are specified (in documents like the W3C APIs that Tizen supports for app development) with respect to abstract services, such as "telephony," rather than with respect to system components, such as network devices. All security policies attempt to bridge this gap by writing set of rules and exceptions that map the abstracts onto specific devices and filesystem locations.

In Tizen 2.x, he explained, the system's security policy was written as a set of Smack rules that attempted to isolate individual applications from each other by creating a separate Smack domain for each installed application. Each app package includes a manifest file detailing the files and directories it creates, and the API privileges it requests. At install time, the system's package manager would read the manifest, create a domain for the new app, and assign a Smack label for that domain to each file and directory installed. It would also compute the new Smack rules that correspond to the new app's combination of privileges and its Smack domain, and add those rules to the system Smack policy.

The problem is that this level of granularity resulted in a huge policy database that was difficult to maintain. "It was almost as big as an SELinux policy," Schaufler said; "I had to go apologize to people at the Security Summit." The upcoming Tizen 3.0 changes things dramatically, however—starting with a simplified, three-domain policy model, which puts all installed apps at one basic privilege level, the "User" domain. It also defines a "Floor" domain for static system data that will not change and a "System" domain for basic system services. This model defines a well-known set of Smack rules (such as allowing all processes to access /tmp and /dev/null) that do not need to be appended to for every installed app.

The Tizen security team decided to revisit how the app privilege framework was implemented as well, so it held a "policy-off" face-to-face meeting at which representatives from Intel and Samsung offices each presented their ideas. When the two offices presented essentially the same design, they decided to move forward with it.

The centerpiece of the new plan is a policy "service" called Cynara. Each installed app is still assigned its own unique Smack label (to protect its private files and directories), but rather than creating a new set of Smack rules and exceptions for each privilege an app requests, Cynara creates a shorter record of the label and its privileges. The complicated mapping between the set of available privileges and the system's resources is created beforehand and is implemented in the Smack rule set, but does not grow for every new app.

When a running app requests access to a system component (for example, the current geolocation reading), the component sends a cynara_check() query to Cynara, including the app's Smack label, the user ID that the app is running as, and the name of the privilege the app is requesting. The Cynara service returns either ALLOW or DENY, based on whether the policy database indicates that the combination of Smack label and privilege are allowed. Other return values are also supported, the speakers said, such as "Ask the user," but the essence is that a straightforward yes-or-no question is answered.

Thus, the Cynara API is quite simple, but the real benefits come by maintaining the simpler database of allowed privileges. In performance testing, Świerczek said, the average response time was under 10ms, as opposed to more than 30ms for some of the alternative solutions they explored—such as PolKit. He also noted that PolKit performance suffers due to some design decisions, such as its use of D-Bus for communication and its use of JSON and XML to store the policy database. That database format meant that the entire policy had to be read and parsed for every call; Cynara, in contrast, stores its database in SQLite.

The two then described the current state of Cynara development and outlined a rough roadmap. The core privilege-checking library is operational, they said, but is not yet working as a full-fledged service. That milestone would likely be reached by the end of June, as would the utilities for updating the policy database. The essential tools necessary for deployment should be in place by the end of July, after which the team would work on adding an asynchronous privilege-checking API and a mechanism for adding extensions to the system's security policy.

There were several questions from the audience, many of which concerned how Tizen uses Smack labels. For example, one audience member asked whether there was a possibility that two apps could accidentally or maliciously get assigned the same Smack labels when installed—which would cause several security problems. Schaufler explained that apps do not choose or assign their own Smack labels; the package manager does. In the Tizen 2.2 release, the Smack label is created from the app's cryptographic signature, so it is guaranteed to be unique (barring collisions, of course).

Perhaps the most difficult aspect of the system to grasp in a 40-minute conference talk is how the Cynara approach to storing security privileges compares in real-world terms to the older Tizen approach of storing a longer, more convoluted set of Smack rules. Unfortunately, time makes it difficult to compare the approaches in detail, but the real-world test will have to wait for the deployment of actual apps—some of which, no doubt, will test the security framework in ways its creators have not yet contemplated. Cynara, however, promises a simpler way to keep track of privileges and access-control rules, so hopefully it will also make it simpler to catch—and fix—problems.

[The author would like to thank the Tizen Association for travel assistance to attend TDC 2014.]

Comments (16 posted)

Brief items

Security quote of the week

At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in Fedora's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys. I am also not aware of anyone else involved in our signing that has been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in Fedora's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys.
Peter Jones writes the first in a series of "canaries" (more info)

Comments (9 posted)

They’re ba-ack: Browser-sniffing ghosts return to haunt Chrome, IE, Firefox (Ars Technica)

Ars Technica looks at a revival of a technique for remote sites to determine browser history. Originally, using JavaScript and CSS allowed sites to track browsing history, but those holes were eventually closed by browser makers. Exploiting a timing attack [PDF] on the browser can distinguish between sites that have been visited and those that have not. "The browser timing attack technique [Aäron] Thijs borrowed from fellow researcher [Paul] Stone abuses a programming interface known as requestAnimationFrame, which is designed to make animations smoother. It can be used to time the browser's rendering, which is the time it takes for the browser to display a given webpage. By measuring variations in the time it takes links to be displayed, attackers can infer if a particular website has been visited."

Comments (10 posted)

Another set of OpenSSL vulnerabilities

The OpenSSL project has disclosed another set of vulnerabilities, including one that could enable man-in-the-middle attacks and one that could maybe lead to code execution. Expect updates from distributors soon. For the curious, Masashi Kikuchi, the discoverer of the MITM vulnerability, has posted the story of how it was found.

Comments (none posted)

New vulnerabilities

check-mk: file disclosure

Package(s):check-mk CVE #(s):CVE-2014-0243
Created:June 10, 2014 Updated:June 11, 2014
Description: From the Red Hat bugzilla:

LSE Leading Security Experts GmbH discovered that the Check_MK agent (Nagios plugin) processed files from the /var/lib/check_mk_agent/job directory which had 1777 permissions. The mk-job program did not check whether any files in this directory where symbolic or hard links. Due to the permissions of this directory, any user could add a symbolic or hard link to any file on the filesystem, and because the Check_MK agent ran as the root user, it could expose arbitrary files via the agent, which exposes all the contents of this directory on TCP port 6556 by default.

This can be worked-around by setting mode 0755 on /var/lib/check_mk_agent/job (removing the sticky bit).

Alerts:
Fedora FEDORA-2014-6818 check-mk 2014-06-10
Fedora FEDORA-2014-6810 check-mk 2014-06-10

Comments (none posted)

dpkg: two file modification via path traversal flaws

Package(s):dpkg CVE #(s):CVE-2014-3864 CVE-2014-3865
Created:June 9, 2014 Updated:July 21, 2014
Description: Multiple vulnerabilities were discovered in dpkg that allow file modification through path traversal when unpacking source packages with especially-crafted patch files.
Alerts:
Fedora FEDORA-2014-8564 dpkg 2014-08-07
Fedora FEDORA-2014-7697 dpkg 2014-07-20
Mageia MGASA-2014-0289 dpkg 2014-07-09
Ubuntu USN-2242-1 dpkg 2014-06-10
Debian DSA-2953-1 dpkg 2014-06-08

Comments (none posted)

echoping: denial of service

Package(s):echoping CVE #(s):CVE-2010-5111
Created:June 6, 2014 Updated:April 10, 2015
Description:

From the Gentoo advisory:

A boundary error exists within the "TLS_readline()" function, which can be exploited to overflow a global buffer by sending an overly long encrypted HTTP reply to Echoping. Also, a similar boundary error exists within the "SSL_readline()" function, which can be exploited in the same manner.

A remote attacker could send a specially crafted HTTP reply, possibly resulting in a Denial of Service condition.

Alerts:
Fedora FEDORA-2015-2600 echoping 2015-04-10
Fedora FEDORA-2015-2584 echoping 2015-04-10
Gentoo 201406-07 echoping 2014-06-06

Comments (none posted)

icinga: code execution

Package(s):icinga CVE #(s):CVE-2013-7106
Created:June 11, 2014 Updated:June 11, 2014
Description: From the CVE entry:

Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.

Alerts:
Debian DSA-2956-1 icinga 2014-06-11

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2014-3153
Created:June 5, 2014 Updated:July 23, 2014
Description: From the Debian advisory:

Pinkie Pie discovered an issue in the futex subsystem that allows a local user to gain ring 0 control via the futex syscall. An unprivileged user could use this flaw to crash the kernel (resulting in denial of service) or for privilege escalation.

Alerts:
Mageia MGASA-2015-0077 kernel-rt 2015-02-19
Oracle ELSA-2015-0290 kernel 2015-03-12
SUSE SUSE-SU-2014:1316-1 Linux kernel 2014-10-22
SUSE SUSE-SU-2014:1319-1 Linux kernel 2014-10-23
Oracle ELSA-2014-1392 kernel 2014-10-21
Mageia MGASA-2014-0332 kernel-vserver 2014-08-18
Mageia MGASA-2014-0337 kernel-tmb 2014-08-18
Mageia MGASA-2014-0331 kernel-tmb 2014-08-18
Mageia MGASA-2014-0336 kernel-linus 2014-08-18
Mageia MGASA-2014-0330 kernel-linus 2014-08-18
Oracle ELSA-2014-0981 kernel 2014-07-29
Oracle ELSA-2014-0786 kernel 2014-07-23
Red Hat RHSA-2014:0913-01 kernel-rt 2014-07-22
Red Hat RHSA-2014:0900-01 kernel 2014-07-17
openSUSE openSUSE-SU-2014:0878-1 kernel 2014-07-08
openSUSE openSUSE-SU-2014:0856-1 kernel 2014-07-01
Ubuntu USN-2260-1 linux-lts-trusty 2014-06-27
Red Hat RHSA-2014:0800-01 kernel 2014-06-26
SUSE SUSE-SU-2014:0837-2 kernel 2014-06-25
SUSE SUSE-SU-2014:0837-1 kernel 2014-06-24
openSUSE openSUSE-SU-2014:0840-1 kernel 2014-06-25
Red Hat RHSA-2014:0786-01 kernel 2014-06-24
Mageia MGASA-2014-0273 kernel 2014-06-22
Scientific Linux SLSA-2014:0771-1 kernel 2014-06-19
Oracle ELSA-2014-0771 kernel 2014-06-19
CentOS CESA-2014:0771 kernel 2014-06-20
Red Hat RHSA-2014:0771-01 kernel 2014-06-19
Mageia MGASA-2014-0265 kernel 2014-06-18
SUSE SUSE-SU-2014:0807-1 Linux Kernel 2014-06-18
Fedora FEDORA-2014-7320 kernel 2014-06-16
Fedora FEDORA-2014-7128 kernel 2014-06-11
SUSE SUSE-SU-2014:0775-1 Linux Kernel 2014-06-11
Oracle ELSA-2014-3037 kernel 2014-06-07
Oracle ELSA-2014-3038 kernel 2014-06-07
Oracle ELSA-2014-3038 kernel 2014-06-07
Oracle ELSA-2014-3039 kernel 2014-06-07
Oracle ELSA-2014-3039 kernel 2014-06-07
Ubuntu USN-2236-1 linux-ti-omap4 2014-06-05
Ubuntu USN-2239-1 linux-lts-saucy 2014-06-05
Ubuntu USN-2238-1 linux-lts-raring 2014-06-05
Ubuntu USN-2237-1 linux-lts-quantal 2014-06-05
Ubuntu USN-2240-1 kernel 2014-06-05
Ubuntu USN-2235-1 kernel 2014-06-05
Ubuntu USN-2241-1 kernel 2014-06-05
Ubuntu USN-2233-1 kernel 2014-06-05
Ubuntu USN-2234-1 EC2 kernel 2014-06-05
Debian DSA-2949-1 kernel 2014-06-05
CentOS CESA-2014:X009 kernel 2014-06-16
SUSE SUSE-SU-2014:0796-1 kernel 2014-06-14
Mandriva MDVSA-2014:124 kernel 2014-06-13

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2014-3917
Created:June 6, 2014 Updated:September 23, 2014
Description:

From the Red Hat bug report:

Linux kernel built with the system-call auditing support(CONFIG_AUDITSYSCALL) is vulnerable to a kernel crash or information disclosure flaw caused by out of bounds memory access. It could occur when system call audit rules are configured on a system. Administrative privileges are required to add such audit rules.

When system call audit rules are present on a system, an unprivileged user/program could use this flaw to leak kernel memory bytes or crash the system resulting DoS.

Alerts:
SUSE SUSE-SU-2015:0812-1 kernel 2015-04-30
Mageia MGASA-2015-0077 kernel-rt 2015-02-19
Oracle ELSA-2015-0290 kernel 2015-03-12
openSUSE openSUSE-SU-2014:1246-1 kernel 2014-09-28
Oracle ELSA-2014-1281 kernel 2014-09-22
CentOS CESA-2014:1281 kernel 2014-09-23
Red Hat RHSA-2014:1281-01 kernel 2014-09-22
SUSE SUSE-SU-2014:1138-1 kernel 2014-09-16
Oracle ELSA-2014-3072 kernel 2014-09-10
Oracle ELSA-2014-3072 kernel 2014-09-10
Oracle ELSA-2014-3073 kernel 2014-09-10
Oracle ELSA-2014-3073 kernel 2014-09-10
Oracle ELSA-2014-3074 kernel 2014-09-10
Oracle ELSA-2014-3074 kernel 2014-09-10
Scientific Linux SLSA-2014:1167-1 kernel 2014-09-09
Oracle ELSA-2014-1167 kernel 2014-09-09
CentOS CESA-2014:1167 kernel 2014-09-09
Red Hat RHSA-2014:1167-01 kernel 2014-09-09
Scientific Linux SLSA-2014:1143-1 kernel 2014-09-04
Oracle ELSA-2014-1143 kernel 2014-09-04
CentOS CESA-2014:1143 kernel 2014-09-04
Red Hat RHSA-2014:1143-01 kernel 2014-09-03
Ubuntu USN-2335-1 linux-ti-omap4 2014-09-02
Ubuntu USN-2334-1 kernel 2014-09-02
Oracle ELSA-2014-1392 kernel 2014-10-21
Mageia MGASA-2014-0332 kernel-vserver 2014-08-18
Mageia MGASA-2014-0337 kernel-tmb 2014-08-18
Mageia MGASA-2014-0331 kernel-tmb 2014-08-18
Mageia MGASA-2014-0336 kernel-linus 2014-08-18
Mageia MGASA-2014-0330 kernel-linus 2014-08-18
Ubuntu USN-2313-1 linux-lts-trusty 2014-08-13
Ubuntu USN-2314-1 kernel 2014-08-13
openSUSE openSUSE-SU-2014:0985-1 kernel 2014-08-11
openSUSE openSUSE-SU-2014:0957-1 kernel 2014-08-01
Red Hat RHSA-2014:0913-01 kernel-rt 2014-07-22
Ubuntu USN-2287-1 linux-lts-saucy 2014-07-16
Ubuntu USN-2286-1 linux-lts-raring 2014-07-16
Ubuntu USN-2285-1 linux-lts-quantal 2014-07-16
Ubuntu USN-2282-1 kernel 2014-07-16
Ubuntu USN-2289-1 kernel 2014-07-16
Ubuntu USN-2281-1 EC2 kernel 2014-07-16
SUSE SUSE-SU-2014:0908-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0909-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0910-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0911-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0912-1 Linux kernel 2014-07-17
Mageia MGASA-2014-0273 kernel 2014-06-22
Mageia MGASA-2014-0265 kernel 2014-06-18
Fedora FEDORA-2014-7320 kernel 2014-06-16
Fedora FEDORA-2014-7033 kernel 2014-06-05
Mandriva MDVSA-2014:124 kernel 2014-06-13

Comments (none posted)

kfreebsd-9: multiple vulnerabilities

Package(s):kfreebsd-9 CVE #(s):CVE-2014-1453 CVE-2014-3000 CVE-2014-3880
Created:June 6, 2014 Updated:June 11, 2014
Description:

From the Debian advisory:

CVE-2014-1453: A remote, authenticated attacker could cause the NFS server become deadlocked, resulting in a denial of service.

CVE-2014-3000: An attacker who can send a series of specifically crafted packets with a connection could cause a denial of service situation by causing the kernel to crash.

Additionally, because the undefined on stack memory may be overwritten by other kernel threads, while difficult, it may be possible for an attacker to construct a carefully crafted attack to obtain portion of kernel memory via a connected socket. This may result in the disclosure of sensitive information such as login credentials, etc. before or even without crashing the system.

CVE-2014-3880: A local attacker can trigger a kernel crash (triple fault) with potential data loss, related to the execve/fexecve system calls. Reported by Ivo De Decker.

Alerts:
Debian DSA-2952-1 kfreebsd-9 2014-06-06

Comments (none posted)

libav: code execution

Package(s):libav CVE #(s):CVE-2014-3984
Created:June 11, 2014 Updated:September 17, 2014
Description: From the Ubuntu advisory:

It was discovered that Libav incorrectly handled certain malformed media files. If a user were tricked into opening a crafted media file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.

Alerts:
Ubuntu USN-2349-1 libav 2014-09-17
Ubuntu USN-2244-1 libav 2014-06-11

Comments (none posted)

libav: multiple unspecified vulnerabilities

Package(s):libav CVE #(s):
Created:June 5, 2014 Updated:June 11, 2014
Description: From the Debian advisory:

Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library. A full list of the changes is available at http://git.libav.org/?p=libav.git;a=blob;f=Changelog;hb=refs/tags/v0.8.12

Alerts:
Debian DSA-2947-1 libav 2014-06-04

Comments (none posted)

mediawiki: cross-site scripting

Package(s):mediawiki CVE #(s):CVE-2014-3966
Created:June 6, 2014 Updated:June 13, 2014
Description:

From the Mageia advisory:

XSS vulnerability in MediaWiki before 1.22.7, due to usernames on Special:PasswordReset being parsed as wikitext. The username on Special:PasswordReset can be supplied by anyone and will be parsed with wgRawHtml enabled. Since Special:PasswordReset is whitelisted by default on private wikis, this could potentially lead to an XSS crossing a privilege boundary (CVE-2014-3966).

Alerts:
Mandriva MDVSA-2014:119 mediawiki 2014-06-10
Fedora FEDORA-2014-6961 mediawiki 2014-06-10
Mageia MGASA-2014-0253 mediawiki 2014-06-06
Debian DSA-2957-1 mediawiki 2014-06-12
Fedora FEDORA-2014-6962 mediawiki 2014-06-10

Comments (none posted)

readline: insecure temporary files

Package(s):readline CVE #(s):CVE-2014-2524
Created:June 10, 2014 Updated:March 29, 2015
Description: From the Red Hat bugzilla:

Steve Kemp discovered the _rl_tropen() function in readline, a set of libraries to handle command lines, insecurely handled a temporary file. This could allow a local attacker to perform symbolic link attacks. As noted in the CVE request, _rl_tropen() is typically only called during debugging.

Alerts:
Mandriva MDVSA-2015:132 readline 2015-03-29
Fedora FEDORA-2014-7496 readline 2014-12-07
openSUSE openSUSE-SU-2014:1226-1 bash 2014-09-28
Mageia MGASA-2014-0319 readline 2014-08-06
Mandriva MDVSA-2014:154 readline 2014-08-06
Fedora FEDORA-2014-7523 readline 2014-07-23
Fedora FEDORA-2014-6866 mingw-readline 2014-06-10
Fedora FEDORA-2014-6820 mingw-readline 2014-06-10

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):firefox thunderbird seamonkey CVE #(s):CVE-2014-1533 CVE-2014-1538 CVE-2014-1541
Created:June 11, 2014 Updated:August 11, 2014
Description: From the CVE entries:

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1533)

Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. (CVE-2014-1538)

Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content. (CVE-2014-1541)

Alerts:
Gentoo 201504-01 firefox 2015-04-07
Mageia MGASA-2014-0419 iceape 2014-10-23
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Fedora FEDORA-2014-8809 thunderbird 2014-08-09
SUSE SUSE-SU-2014:0905-1 firefox 2014-07-17
openSUSE openSUSE-SU-2014:0858-1 thunderbird 2014-07-01
openSUSE openSUSE-SU-2014:0855-1 seamonkey 2014-07-01
SUSE SUSE-SU-2014:0824-3 firefox 2014-06-25
Slackware SSA:2014-175-05 seamonkey 2014-06-24
SUSE SUSE-SU-2014:0824-2 firefox 2014-06-23
SUSE SUSE-SU-2014:0824-1 firefox 2014-06-21
openSUSE openSUSE-SU-2014:0819-1 MozillaFirefox, 2014-06-20
Ubuntu USN-2250-1 thunderbird 2014-06-19
Debian DSA-2960-1 icedove 2014-06-16
CentOS CESA-2014:0742 thunderbird 2014-06-11
CentOS CESA-2014:0741 firefox 2014-06-11
CentOS CESA-2014:0741 firefox 2014-06-11
Oracle ELSA-2014-0742 thunderbird 2014-06-10
Red Hat RHSA-2014:0741-01 firefox 2014-06-10
openSUSE openSUSE-SU-2014:0797-1 Mozilla 2014-06-16
Fedora FEDORA-2014-7310 xulrunner 2014-06-13
Fedora FEDORA-2014-7310 nspr 2014-06-13
Fedora FEDORA-2014-7310 firefox 2014-06-13
Slackware SSA:2014-163-01 thunderbird 2014-06-12
Scientific Linux SLSA-2014:0741-1 firefox 2014-06-11
Oracle ELSA-2014-0741 firefox 2014-06-11
Mageia MGASA-2014-0260 firefox, thunderbird 2014-06-11
CentOS CESA-2014:0742 thunderbird 2014-06-11
Ubuntu USN-2243-1 firefox 2014-06-11
Scientific Linux SLSA-2014:0742-1 thunderbird 2014-06-11
Oracle ELSA-2014-0741 firefox 2014-06-10
Debian DSA-2955-1 iceweasel 2014-06-11
Red Hat RHSA-2014:0742-01 thunderbird 2014-06-10

Comments (none posted)

mozilla: code execution

Package(s):iceweasel firefox thunderbird seamonkey CVE #(s):CVE-2014-1545
Created:June 11, 2014 Updated:July 17, 2014
Description: From the CVE entry:

Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.

Alerts:
Gentoo 201504-01 firefox 2015-04-07
Mandriva MDVSA-2015:059 nss 2015-03-13
CentOS CESA-2014:1246 nss, nspr 2014-09-30
Scientific Linux SLSA-2014:1246-1 nss and nspr 2014-09-26
Oracle ELSA-2014-1246 nss, nspr 2014-09-17
Red Hat RHSA-2014:1246-01 nss, nspr 2014-09-16
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Scientific Linux SLSA-2014:0917-1 nss and nspr 2014-07-22
Oracle ELSA-2014-0917 nss, nspr 2014-07-22
Red Hat RHSA-2014:0917-01 nss, nspr 2014-07-22
SUSE SUSE-SU-2014:0905-1 firefox 2014-07-17
Ubuntu USN-2265-1 nspr 2014-07-02
openSUSE openSUSE-SU-2014:0858-1 thunderbird 2014-07-01
openSUSE openSUSE-SU-2014:0855-1 seamonkey 2014-07-01
SUSE SUSE-SU-2014:0824-3 firefox 2014-06-25
Slackware SSA:2014-175-05 seamonkey 2014-06-24
SUSE SUSE-SU-2014:0824-2 firefox 2014-06-23
SUSE SUSE-SU-2014:0824-1 firefox 2014-06-21
openSUSE openSUSE-SU-2014:0819-1 MozillaFirefox, 2014-06-20
Debian DSA-2962-1 nspr 2014-06-17
Debian DSA-2960-1 icedove 2014-06-16
Debian DSA-2955-1 iceweasel 2014-06-11
openSUSE openSUSE-SU-2014:0797-1 Mozilla 2014-06-16
Mandriva MDVSA-2014:125 nspr 2014-06-13

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):firefox thunderbird seamonkey CVE #(s):CVE-2014-1534 CVE-2014-1536 CVE-2014-1537 CVE-2014-1540 CVE-2014-1542
Created:June 11, 2014 Updated:January 26, 2015
Description: From the CVE entries:

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. (CVE-2014-1534)

The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors. (CVE-2014-1536)

Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. (CVE-2014-1537)

Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content. (CVE-2014-1540)

Buffer overflow in the Speex resampler in the Web Audio subsystem in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code via vectors related to a crafted AudioBuffer channel count and sample rate. (CVE-2014-1542)

Alerts:
Gentoo 201504-01 firefox 2015-04-07
openSUSE openSUSE-SU-2015:0138-1 Firefox 2015-01-25
Mageia MGASA-2014-0419 iceape 2014-10-23
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Fedora FEDORA-2014-8809 thunderbird 2014-08-09
SUSE SUSE-SU-2014:0905-1 firefox 2014-07-17
Fedora FEDORA-2014-7690 seamonkey 2014-07-03
Fedora FEDORA-2014-7682 seamonkey 2014-07-03
openSUSE openSUSE-SU-2014:0858-1 thunderbird 2014-07-01
openSUSE openSUSE-SU-2014:0855-1 seamonkey 2014-07-01
SUSE SUSE-SU-2014:0824-3 firefox 2014-06-25
Slackware SSA:2014-175-05 seamonkey 2014-06-24
SUSE SUSE-SU-2014:0824-2 firefox 2014-06-23
SUSE SUSE-SU-2014:0824-1 firefox 2014-06-21
openSUSE openSUSE-SU-2014:0819-1 MozillaFirefox, 2014-06-20
Ubuntu USN-2243-1 firefox 2014-06-11
openSUSE openSUSE-SU-2014:0797-1 Mozilla 2014-06-16
Fedora FEDORA-2014-7279 xulrunner 2014-06-15
Fedora FEDORA-2014-7325 thunderbird 2014-06-15
Fedora FEDORA-2014-7279 nspr 2014-06-15
Fedora FEDORA-2014-7279 firefox 2014-06-15
Fedora FEDORA-2014-7310 xulrunner 2014-06-13
Fedora FEDORA-2014-7310 nspr 2014-06-13
Fedora FEDORA-2014-7310 firefox 2014-06-13

Comments (none posted)

mysql: a whole passel of unspecified vulnerabilities

Package(s):MySQL CVE #(s):CVE-2013-4316 CVE-2013-5860 CVE-2013-5881 CVE-2013-5882 CVE-2013-5894 CVE-2014-0427 CVE-2014-0430 CVE-2014-0431 CVE-2014-0433 CVE-2014-2434 CVE-2014-2435 CVE-2014-2442 CVE-2014-2444 CVE-2014-2450 CVE-2014-2451
Created:June 9, 2014 Updated:June 11, 2014
Description: Another batch of unspecified vulnerabilities in MySQL.
Alerts:
Gentoo 201409-04 mysql 2014-09-04
SUSE SUSE-SU-2014:0769-1 MySQL 2014-06-07

Comments (none posted)

openssl: three vulnerabilities

Package(s):openssl CVE #(s):CVE-2014-0195 CVE-2014-0221 CVE-2014-3470
Created:June 5, 2014 Updated:August 14, 2014
Description: From the Red Hat advisory:

A buffer overflow flaw was found in the way OpenSSL handled invalid DTLS packet fragments. A remote attacker could possibly use this flaw to execute arbitrary code on a DTLS client or server. (CVE-2014-0195)

A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash. (CVE-2014-0221)

A NULL pointer dereference flaw was found in the way OpenSSL performed anonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially crafted handshake packet could cause a TLS/SSL client that has the anonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)

Alerts:
openSUSE openSUSE-SU-2016:0640-1 libopenssl0_9_8 2016-03-03
SUSE SUSE-SU-2015:0743-1 mariadb 2015-04-21
Mandriva MDVSA-2015:062 openssl 2015-03-27
SUSE SUSE-SU-2015:0578-1 compat-openssl097g 2015-03-24
Fedora FEDORA-2014-17576 mingw-openssl 2015-01-02
Fedora FEDORA-2014-17587 mingw-openssl 2015-01-02
Oracle ELSA-2014-1653 openssl 2014-10-16
Oracle ELSA-2014-1652 openssl 2014-10-16
Ubuntu USN-2232-4 openssl 2014-08-18
Scientific Linux SLSA-2014:1053-1 openssl 2014-08-14
Oracle ELSA-2014-1053 openssl 2014-08-13
CentOS CESA-2014:1053 openssl 2014-08-13
Red Hat RHSA-2014:1053-01 openssl 2014-08-13
Gentoo 201407-05 openssl 2014-07-28
Oracle ELSA-2014-0679 openssl 2014-07-23
Ubuntu USN-2232-2 openssl 2014-06-12
Debian DSA-2950-2 openssl 2014-06-16
Red Hat RHSA-2014:0679-01 openssl 2014-06-10
Mandriva MDVSA-2014:105 openssl 2014-06-09
SUSE SUSE-SU-2014:0759-2 OpenSSL 2014-06-07
SUSE SUSE-SU-2014:0762-1 OpenSSL 1.0 2014-06-06
SUSE SUSE-SU-2014:0761-1 OpenSSL 2014-06-06
SUSE SUSE-SU-2014:0759-1 OpenSSL 2014-06-06
Slackware SSA:2014-156-03 openssl 2014-06-05
Scientific Linux SLSA-2014:0625-1 openssl 2014-06-05
Oracle ELSA-2014-0625 openssl 2014-06-05
openSUSE openSUSE-SU-2014:0765-1 openssl 2014-06-06
Mageia MGASA-2014-0255 openssl 2014-06-06
Fedora FEDORA-2014-7102 openssl 2014-06-05
Fedora FEDORA-2014-7101 openssl 2014-06-05
Ubuntu USN-2232-1 openssl 2014-06-05
Debian DSA-2950-1 openssl 2014-06-05
CentOS CESA-2014:0625 openssl 2014-06-05
Red Hat RHSA-2014:0625-01 openssl 2014-06-05
Mandriva MDVSA-2014:106 openssl 2014-06-09
openSUSE openSUSE-SU-2014:0764-1 openssl 2014-06-06

Comments (none posted)

openssl: man-in-the-middle attack

Package(s):openssl CVE #(s):CVE-2014-0224
Created:June 5, 2014 Updated:July 24, 2014
Description: From the Red Hat advisory:

It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. (CVE-2014-0224)

More information is available in this blog post by Masashi Kikuchi, who discovered the bug.

Alerts:
Oracle ELSA-2016-0372 openssl098e 2016-03-09
openSUSE openSUSE-SU-2016:0640-1 libopenssl0_9_8 2016-03-03
SUSE SUSE-SU-2015:0743-1 mariadb 2015-04-21
SUSE SUSE-SU-2015:0620-1 MySQL 2015-03-28
Mandriva MDVSA-2015:062 openssl 2015-03-27
SUSE SUSE-SU-2015:0578-1 compat-openssl097g 2015-03-24
openSUSE openSUSE-SU-2015:0229-1 virtualbox 2015-02-06
Fedora FEDORA-2014-17576 mingw-openssl 2015-01-02
Fedora FEDORA-2014-17587 mingw-openssl 2015-01-02
Oracle ELSA-2014-1653 openssl 2014-10-16
Oracle ELSA-2014-1652 openssl 2014-10-16
Ubuntu USN-2232-4 openssl 2014-08-18
Oracle ELSA-2014-1053 openssl 2014-08-13
Gentoo 201407-05 openssl 2014-07-28
Oracle ELSA-2014-0680 openssl098e 2014-07-23
Oracle ELSA-2014-0679 openssl 2014-07-23
Ubuntu USN-2232-3 openssl 2014-06-23
Ubuntu USN-2232-2 openssl 2014-06-12
Debian DSA-2950-2 openssl 2014-06-16
Scientific Linux SLSA-2014:0627-1 openssl 2014-06-11
Red Hat RHSA-2014:0679-01 openssl 2014-06-10
Mandriva MDVSA-2014:105 openssl 2014-06-09
SUSE SUSE-SU-2014:0759-2 OpenSSL 2014-06-07
SUSE SUSE-SU-2014:0768-1 OpenSSL 2014-06-07
SUSE SUSE-SU-2014:0762-1 OpenSSL 1.0 2014-06-06
SUSE SUSE-SU-2014:0761-1 OpenSSL 2014-06-06
SUSE SUSE-SU-2014:0759-1 OpenSSL 2014-06-06
Slackware SSA:2014-156-03 openssl 2014-06-05
Scientific Linux SLSA-2014:0626-1 openssl097a and openssl098e 2014-06-05
Scientific Linux SLSA-2014:0625-1 openssl 2014-06-05
Oracle ELSA-2014-0626 openssl097a and openssl098e 2014-06-05
Oracle ELSA-2014-0626 openssl097a and openssl098e 2014-06-05
Oracle ELSA-2014-0624 openssl 2014-06-05
Oracle ELSA-2014-0625 openssl 2014-06-05
openSUSE openSUSE-SU-2014:0765-1 openssl 2014-06-06
Mageia MGASA-2014-0255 openssl 2014-06-06
Fedora FEDORA-2014-7102 openssl 2014-06-05
Fedora FEDORA-2014-7101 openssl 2014-06-05
CentOS CESA-2014:0624 openssl 2014-06-06
Ubuntu USN-2232-1 openssl 2014-06-05
Debian DSA-2950-1 openssl 2014-06-05
CentOS CESA-2014:0626 openssl097a and openssl098e 2014-06-05
CentOS CESA-2014:0626 openssl097a and openssl098e 2014-06-05
CentOS CESA-2014:0625 openssl 2014-06-05
Red Hat RHSA-2014:0626-01 openssl097a and openssl098e 2014-06-05
Red Hat RHSA-2014:0624-01 openssl 2014-06-05
Red Hat RHSA-2014:0625-01 openssl 2014-06-05
Red Hat RHSA-2014:0627-01 openssl 2014-06-05
Mandriva MDVSA-2014:106 openssl 2014-06-09
Oracle ELSA-2014-3040 openssl 2014-06-11
openSUSE openSUSE-SU-2014:0764-1 openssl 2014-06-06
Scientific Linux SLSA-2014:0624-1 openssl 2014-06-11
Red Hat RHSA-2014:0680-01 openssl098e 2014-06-10

Comments (none posted)

python-bottle: security mechanism bypass

Package(s):python-bottle CVE #(s):CVE-2014-3137
Created:June 5, 2014 Updated:August 15, 2014
Description: From the Debian advisory:

It was discovered that Bottle, a WSGI-framework for Python, performed a too permissive detection of JSON content, resulting a potential bypass of security mechanisms.

Alerts:
Fedora FEDORA-2014-8334 python-bottle 2014-08-15
Fedora FEDORA-2014-8328 python-bottle 2014-08-15
Debian DSA-2948-1 python-bottle 2014-06-04

Comments (none posted)

qemu: multiple vulnerabilities

Package(s):qemu CVE #(s):CVE-2014-0222 CVE-2014-0223 CVE-2014-3461
Created:June 10, 2014 Updated:September 15, 2014
Description: From the Red Hat bugzilla:

CVE-2014-0223: Qemu block driver for the QCOW version 1 image format is vulnerable to an integer overflow flaw. It occurs due to weak input validations or logic errors. Such integer overflow could lead to buffer overflows, memory corruption or crash in Qemu instance.

An user able to alter the Qemu disk image files loaded by a guest could use this flaw to crash the Qemu instance resulting in DoS or corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVE-2014-0222: Qemu block driver for the QCOW version 1 image format is vulnerable to an integer overflow flaw. It occurs due to weak input validations or logic errors. Such integer overflow could lead to buffer overflows, memory corruption or crash in Qemu instance.

An user able to alter the Qemu disk image files loaded by a guest could use this flaw to crash the Qemu instance resulting in DoS or corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVE-2014-3461: Correct post load checks:

  1. dev->setup_len == sizeof(dev->data_buf) seems fine, no need to fail migration
  2. When state is DATA, passing index > len will cause memcpy with negative length, resulting in heap overflow
An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
Alerts:
SUSE SUSE-SU-2016:1745-1 xen 2016-07-06
SUSE SUSE-SU-2016:1445-1 Xen 2016-05-30
SUSE SUSE-SU-2016:1318-1 xen 2016-05-17
SUSE SUSE-SU-2016:1154-1 xen 2016-04-26
openSUSE openSUSE-SU-2016:0995-1 xen 2016-04-08
SUSE SUSE-SU-2016:0955-1 xen 2016-04-05
openSUSE openSUSE-SU-2016:0914-1 xen 2016-03-30
SUSE SUSE-SU-2016:0873-1 xen 2016-03-24
SUSE SUSE-SU-2016:0658-1 Xen 2016-03-04
openSUSE openSUSE-SU-2015:2003-1 xen 2015-11-17
openSUSE openSUSE-SU-2015:1965-1 xen 2015-11-12
openSUSE openSUSE-SU-2015:1964-1 xen 2015-11-12
SUSE SUSE-SU-2015:1952-1 xen 2015-11-10
SUSE SUSE-SU-2015:1908-1 xen 2015-11-04
SUSE SUSE-SU-2015:1894-1 xen 2015-11-03
SUSE SUSE-SU-2015:1853-1 xen 2015-10-30
SUSE SUSE-SU-2015:0929-1 KVM 2015-05-22
Mandriva MDVSA-2015:061 qemu 2015-03-13
Oracle ELSA-2015-0349 qemu-kvm 2015-03-12
Mandriva MDVSA-2014:220 qemu 2014-11-21
Mageia MGASA-2014-0426 qemu 2014-10-28
Debian DSA-3044-1 qemu-kvm 2014-10-04
Debian DSA-3045-1 qemu 2014-10-04
Red Hat RHSA-2014:1268-01 qemu-kvm-rhev 2014-09-22
Red Hat RHSA-2014:1187-01 qemu-kvm-rhev 2014-09-15
Ubuntu USN-2342-1 qemu, qemu-kvm 2014-09-08
Gentoo 201408-17 qemu 2014-08-30
Oracle ELSA-2014-1075 qemu-kvm 2014-08-19
CentOS CESA-2014:1075 qemu-kvm 2014-08-19
Scientific Linux SLSA-2014:1075-1 qemu-kvm 2014-08-19
Red Hat RHSA-2014:1075-01 qemu-kvm 2014-08-19
CentOS CESA-2014:0927 qemu-kvm 2014-07-25
Red Hat RHSA-2014:0888-01 qemu-kvm-rhev 2014-07-24
Oracle ELSA-2014-0927 qemu-kvm 2014-07-23
Red Hat RHSA-2014:0927-01 qemu-kvm 2014-07-23
Scientific Linux SLSA-2014:0743-1 qemu-kvm 2014-06-11
Red Hat RHSA-2014:0743-01 qemu-kvm 2014-06-10
CentOS CESA-2014:0743 qemu-kvm 2014-06-11
Oracle ELSA-2014-0743 qemu-kvm 2014-06-10
Fedora FEDORA-2014-6970 qemu 2014-06-10

Comments (none posted)

sendmail: denial of service

Package(s):sendmail CVE #(s):CVE-2014-3956
Created:June 6, 2014 Updated:March 29, 2015
Description:

From the Slackware advisory:

This release fixes one security related bug by properly closing file descriptors (except stdin, stdout, and stderr) before executing programs. This bug could enable local users to interfere with an open SMTP connection if they can execute their own program for mail delivery (e.g., via procmail or the prog mailer).

Alerts:
Mandriva MDVSA-2015:128 sendmail 2015-03-29
Gentoo 201412-32 sendmail 2014-12-22
Mandriva MDVSA-2014:147 sendmail 2014-07-31
Mageia MGASA-2014-0270 sendmail 2014-06-20
Fedora FEDORA-2014-7095 sendmail 2014-06-19
openSUSE openSUSE-SU-2014:0804-1 sendmail 2014-06-17
openSUSE openSUSE-SU-2014:0805-1 sendmail 2014-06-17
Slackware SSA:2014-156-04 sendmail 2014-06-05
Fedora FEDORA-2014-7093 sendmail 2014-06-13

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2014, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds