|
|
Subscribe / Log in / New account

Security

Browser tracking through "canvas fingerprinting"

By Nathan Willis
July 23, 2014

Recently, public attention has been called to a new online user-tracking method that is purported to be nearly impossible to block. Called "canvas fingerprinting," the technique relies on forcing the browser to generate an image on the client side of the connection—an image that is unique enough to serve as a fingerprint for the browser that created it. In fact, the basis for this fingerprinting approach is several years old, but it does now seem to be in use in the wild. Whether or not it truly amounts to an insurmountable blocking challenge, however, remains to be seen.

ProPublica was among the first to report the discovery of the technique, in an article dated July 21. The tracker was discovered running on multiple high-traffic web sites, and was served by the web-tracking vendor AddThis. AddThis's user-visible feature is the appearance of click-and-share-this-link buttons that connect to various social-media services; the web-tracking function that accompanies said buttons is not advertised, of course.

The new tracker uses the HTML5 <canvas> element, telling the user's browser to draw a hidden image containing the text "Cwm fjordbank glyphs vext quiz"—which is a pangram in English, containing every letter of the alphabet. The text is rendered in the <canvas> element multiple times, in different colors and overlapping—and differences in the graphics stacks of different computers will produce slightly different results. That, plus the variations in browser-window size, text-rendering settings, and other variables, mean that the resulting image, when rasterized, will exhibit a considerable amount of variation from one browser to the next. It can thus be sent back to the originating server (via the ToDataUrl method) to serve as a fingerprint to track the browser between different sites and repeat visits.

Inquisitive users can visit the browserleaks.com page that tests <canvas> support to tell whether or not they are susceptible to this form of fingerprinting.

Although the AddThis fingerprinting tracker appears to be the first of its kind, the concept of canvas fingerprinting is not new. It was first described in detail in a 2012 paper written by Keaton Mowery and Hovav Shacham. The paper describes tests performed both with text rendering and by creating an image with WebGL. It goes into considerable detail about what parts of the browser and graphics stack contribute to differences in the resulting rendered image.

On the OpenGL side, the authors noted differences in the antialiasing algorithm, the interpolation of textures, and the illumination calculated for the OpenGL light source that is pointed at the image. In the text component, even though all text elements were rendered in the Arial font, there were discernible differences between the version of Arial used, the sub-pixel hinting, spacing, and antialiasing.

Ultimately, Mowery and Shacham estimated that their tests revealed an entropy of 5.73 bits, but noted that the tests were not sophisticated and that further refinement could yield better results. This is not an insignificant amount of entropy, but it is worth putting in context. The Panopticlick project from the Electronic Frontier Foundation (EFF) notes that the average browser fingerprint it observes contains 18.1 bits of entropy or more, which is enough to uniquely identify one browser out of roughly 280,000. An additional 5.73 bits pushes that number to one in 14.6 million.

Thus, even the relatively modest entropy accounted for in Mowery and Shacham's research can constitute a real threat to individual privacy when it is used in conjunction with other techniques. But the AddThis canvas fingerprinting technique may have improved on the 2012 research in other ways. ProPublica attributed the discovery of the new AddThis tracker to a team of researchers at KU Leuven University in Belgium and Princeton University in the United States. The team's findings have been published on the web, but the code and data have not yet been released—although the researchers have said it will be made public shortly.

On the other hand, assessing the real-world implications of this new flavor of web tracker requires determining how difficult it is to defeat. ProPublica titled its article on the find "Meet the Online Tracking Device That is Virtually Impossible to Block," but that would appear to overstate matters. Tor implemented a canvas-fingerprinting blocker in the Tor Browser Bundle in 2012. The EFF told MediaPost that its recent update to the Privacy Badger extension will block the AddThis tracker along with other social-media-based trackers. And commenters on many web articles about the find have also reported that the tracker can be defeated by the usual options like NoScript or by disabling JavaScript entirely.

The ProPublica article does mention tracker-blocking options in a sidebar, although it labels them with discouraging warnings like "can be slow" and "requires a lot of research and decision-making". Users who are attuned to the risks of browser-tracking and the steps necessary to combat it may find such commentary objectionable. But then again, it is the "average user" who makes up the bulk of the population that AddThis and other web-tracking companies will be collecting data from. Reality is, unfortunately, that a great many users cannot or will not take steps to improve their privacy beyond whatever ships by default in the browser. Even if canvas fingerprinting fails to catch on, the contest to capture those user's movements through the web will undoubtedly just move on to the next user-tracking idea.

Comments (36 posted)

Brief items

Security quotes of the week

Thirdly, every iOS device has a packet sniffer built in, which can be remotely activated and operates invisibly to the user.

Finally, a task called file_relay allows Apple to remotely dump your address book, voicemail recordings, calendar, SMS messages, screenshots, e-mail accounts, and so on.

I challenge anyone technical to read the details [PDF] and not conclude that iOS is deliberately designed to support spying.

— "Mathew" — more information in a blog post by the author of the original paper

Using this vulnerability, we can patch the Nest from sending that data to Nest servers. There was no performance impact whatsoever on the unit we tested this on.
Orlando Arias on using a Nest vulnerability to protect Nest customers' privacy

We're happy to see that TAILS 1.1 is being released tomorrow. Our multiple RCE/de-anonymization zero-days are still effective. #tails #tor
Exodus Intel

We were not contacted by Exodus Intel prior to their tweet. In fact, a more irritated version of this text was ready when we finally received an email from them. They informed us that they would provide us with a report within a week.
Tails

Comments (2 posted)

Docker security with SELinux (Opensource.com)

Dan Walsh looks at container security, on Opensource.com. "I hear and read about a lot of people assuming that Docker containers actually sandbox applications—meaning they can run random applications on their system as root with Docker. They believe Docker containers will actually protect their host system [...] Stop assuming that Docker and the Linux kernel protect you from malware."

Comments (22 posted)

New vulnerabilities

acpi-support: privilege escalation

Package(s):acpi-support CVE #(s):CVE-2014-1419
Created:July 23, 2014 Updated:August 12, 2014
Description: From the Debian advisory:

CESG discovered a root escalation flaw in the acpi-support package. An unprivileged user can inject the DBUS_SESSION_BUS_ADDRESS environment variable to run arbitrary commands as root user via the policy-funcs script.

Alerts:
Debian DSA-2984-2 acpi-support 2014-08-11
Ubuntu USN-2297-1 acpi-support 2014-07-22
Debian DSA-2984-1 acpi-support 2014-07-22

Comments (1 posted)

cups: privilege escalation

Package(s):cups CVE #(s):CVE-2014-3537
Created:July 21, 2014 Updated:July 28, 2014
Description: From the Red Hat bugzilla:

It was discovered that a local user with privileges of group=lp can write symbolic links in the rss directory and use that to gain '@SYSTEM' group privilege with cupsd.

Alerts:
Mandriva MDVSA-2015:108 cups 2015-03-29
Scientific Linux SLSA-2014:1388-2 cups 2014-11-03
Red Hat RHSA-2014:1388-02 cups 2014-10-14
Oracle ELSA-2014-1388 cups 2014-10-16
Fedora FEDORA-2014-8752 cups 2014-07-30
Mandriva MDVSA-2014:151 cups 2014-08-06
Mageia MGASA-2014-0313 cups 2014-08-05
Debian DSA-2990-1 cups 2014-07-27
Ubuntu USN-2293-1 cups 2014-07-21
Fedora FEDORA-2014-8351 cups 2014-07-19

Comments (2 posted)

httpd: multiple vulnerabilities

Package(s):httpd CVE #(s):CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2013-4352 CVE-2014-0117
Created:July 23, 2014 Updated:April 13, 2015
Description: From the Red Hat advisory:

A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2014-0226)

A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. (CVE-2014-0118)

A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely. (CVE-2014-0231)

A NULL pointer dereference flaw was found in the mod_cache httpd module. A malicious HTTP server could cause the httpd child process to crash when the Apache HTTP Server was used as a forward proxy with caching. (CVE-2013-4352)

A denial of service flaw was found in the mod_proxy httpd module. A remote attacker could send a specially crafted request to a server configured as a reverse proxy using a threaded Multi-Processing Modules (MPM) that would cause the httpd child process to crash. (CVE-2014-0117)

Alerts:
Gentoo 201504-03 apache 2015-04-11
Mandriva MDVSA-2015:093 apache 2015-03-28
openSUSE openSUSE-SU-2014:1647-1 apache2 2014-12-15
SUSE SUSE-SU-2014:1082-1 apache2 2014-09-02
SUSE SUSE-SU-2014:1081-1 apache2 2014-09-02
SUSE SUSE-SU-2014:1080-1 apache2 2014-09-02
Gentoo 201408-12 apache 2014-08-29
openSUSE openSUSE-SU-2014:1044-1 apache2 2014-08-20
openSUSE openSUSE-SU-2014:1045-1 apache2 2014-08-20
Fedora FEDORA-2014-9057 httpd 2014-08-15
openSUSE openSUSE-SU-2014:0969-1 apache 2014-08-07
Mandriva MDVSA-2014:142 apache 2014-07-30
Mageia MGASA-2014-0304 apache 2014-07-29
SUSE SUSE-SU-2014:0967-1 the Apache Web Server 2014-08-07
Mageia MGASA-2014-0305 apache 2014-07-29
Fedora FEDORA-2014-8742 httpd 2014-07-25
Debian DSA-2989-1 apache2 2014-07-24
Ubuntu USN-2299-1 apache2 2014-07-23
Slackware SSA:2014-204-01 httpd 2014-07-23
Oracle ELSA-2014-0920 httpd 2014-07-23
Oracle ELSA-2014-0920 httpd 2014-07-23
Oracle ELSA-2014-0921 httpd 2014-07-23
CentOS CESA-2014:0920 httpd 2014-07-23
CentOS CESA-2014:0920 httpd 2014-07-23
Scientific Linux SLSA-2014:0920-1 httpd 2014-07-23
Red Hat RHSA-2014:0922-01 httpd24-httpd 2014-07-23
Red Hat RHSA-2014:0921-01 httpd 2014-07-23
Red Hat RHSA-2014:0920-01 httpd 2014-07-23

Comments (none posted)

java-1.7.0-oracle: multiple unspecified vulnerabilities

Package(s):java-1.7.0-oracle CVE #(s):CVE-2014-4208 CVE-2014-4220 CVE-2014-4227 CVE-2014-4264 CVE-2014-4265
Created:July 18, 2014 Updated:July 23, 2014
Description:

From the CVE entries:

CVE-2014-4208: Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4220.

CVE-2014-4220: Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4208.

CVE-2014-4227: Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.

CVE-2014-4264: Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect availability via unknown vectors related to Security.

CVE-2014-4265: Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment.

Alerts:
Gentoo 201502-12 oracle-jre-bin 2015-02-15
SUSE SUSE-SU-2015:0392-1 java-1_6_0-ibm 2015-02-27
openSUSE openSUSE-SU-2014:1645-1 java-1_7_0-openjdk 2014-12-15
openSUSE openSUSE-SU-2014:1638-1 java-1_7_0-openjdk 2014-12-15
Ubuntu USN-2319-3 OpenJDK 7 2014-09-16
Ubuntu USN-2319-2 openjdk-7 2014-08-25
Ubuntu USN-2319-1 openjdk-7 2014-08-19
Red Hat RHSA-2014:1042-01 java-1.7.1-ibm 2014-08-11
Red Hat RHSA-2014:1041-01 java-1.7.0-ibm 2014-08-11
Red Hat RHSA-2014:1033-01 java-1.6.0-ibm 2014-08-07
Debian DSA-2987-1 openjdk-7 2014-07-23
Red Hat RHSA-2014:0908-01 java-1.6.0-sun 2014-07-21
Fedora FEDORA-2014-8417 java-1.7.0-openjdk 2014-07-19
Red Hat RHSA-2014:0902-01 java-1.7.0-oracle 2014-07-18
SUSE SUSE-SU-2014:0961-1 openjdk 2014-08-04

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656
Created:July 17, 2014 Updated:July 30, 2015
Description: From the SUSE advisory:

CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795)

CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795)

CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795)

CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795)

CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795)

Alerts:
Scientific Linux SLSA-2015:1272-1 kernel 2015-08-03
Oracle ELSA-2015-1272 kernel 2015-07-29
Red Hat RHSA-2015:1272-01 kernel 2015-07-22
SUSE SUSE-SU-2015:0812-1 kernel 2015-04-30
Oracle ELSA-2015-3012 kernel 2015-03-19
Oracle ELSA-2015-3012 kernel 2015-03-19
Oracle ELSA-2015-0290 kernel 2015-03-12
Oracle ELSA-2015-0087 kernel 2015-01-28
CentOS CESA-2015:0087 kernel 2015-01-28
Scientific Linux SLSA-2015:0087-1 kernel 2015-01-28
Red Hat RHSA-2015:0087-01 kernel 2015-01-27
Oracle ELSA-2014-3103 kernel 2014-12-11
Oracle ELSA-2014-3104 kernel 2014-12-11
Oracle ELSA-2014-3105 kernel 2014-12-11
Oracle ELSA-2014-3103 kernel 2014-12-11
Oracle ELSA-2014-3105 kernel 2014-12-11
Oracle ELSA-2014-3104 kernel 2014-12-11
Scientific Linux SLSA-2014:1971-1 kernel 2014-12-10
Oracle ELSA-2014-1971 kernel 2014-12-09
CentOS CESA-2014:1971 kernel 2014-12-10
Red Hat RHSA-2014:1971-01 kernel 2014-12-09
Oracle ELSA-2014-3096 kernel 2014-12-04
Oracle ELSA-2014-3096 kernel 2014-12-04
Scientific Linux SLSA-2014:1392-1 kernel 2014-11-03
Scientific Linux SLSA-2014:1724-1 kernel 2014-11-03
Oracle ELSA-2014-1724 kernel 2014-10-28
CentOS CESA-2014:1724 kernel 2014-10-29
Red Hat RHSA-2014:1724-01 kernel 2014-10-28
openSUSE openSUSE-SU-2014:1246-1 kernel 2014-09-28
SUSE SUSE-SU-2014:1138-1 kernel 2014-09-16
Ubuntu USN-2335-1 linux-ti-omap4 2014-09-02
Ubuntu USN-2336-1 linux-lts-trusty 2014-09-02
Ubuntu USN-2332-1 kernel 2014-09-02
Ubuntu USN-2334-1 kernel 2014-09-02
Ubuntu USN-2337-1 kernel 2014-09-02
Ubuntu USN-2333-1 EC2 kernel 2014-09-02
Oracle ELSA-2014-1392 kernel 2014-10-21
Red Hat RHSA-2014:1083-01 kernel-rt 2014-08-20
Red Hat RHSA-2014:1392-01 kernel 2014-10-14
openSUSE openSUSE-SU-2014:0985-1 kernel 2014-08-11
openSUSE openSUSE-SU-2014:0957-1 kernel 2014-08-01
Mandriva MDVSA-2014:155 kernel 2014-08-07
SUSE SUSE-SU-2014:0908-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0909-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0910-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0911-1 Linux kernel 2014-07-17
SUSE SUSE-SU-2014:0912-1 Linux kernel 2014-07-17

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2014-4943
Created:July 17, 2014 Updated:August 7, 2014
Description: From the Ubuntu advisory:

Sasha Levin reported a flaw in the Linux kernel's point-to-point protocol (PPP) when used with the Layer Two Tunneling Protocol (L2TP). A local user could exploit this flaw to gain administrative privileges. (CVE-2014-4943)

Alerts:
openSUSE openSUSE-SU-2015:0566-1 kernel 2015-03-21
SUSE SUSE-SU-2015:0481-1 kernel 2015-03-11
Oracle ELSA-2015-0290 kernel 2015-03-12
openSUSE openSUSE-SU-2014:1669-1 kernel 2014-12-19
openSUSE openSUSE-SU-2014:1677-1 kernel 2014-12-21
SUSE SUSE-SU-2014:1316-1 Linux kernel 2014-10-22
SUSE SUSE-SU-2014:1319-1 Linux kernel 2014-10-23
Oracle ELSA-2014-1281 kernel 2014-09-22
SUSE SUSE-SU-2014:1138-1 kernel 2014-09-16
Oracle ELSA-2014-1167 kernel 2014-09-09
Oracle ELSA-2014-1392 kernel 2014-10-21
Oracle ELSA-2014-0981 kernel 2014-07-29
Oracle ELSA-2014-1023 kernel 2014-08-06
Mandriva MDVSA-2014:155 kernel 2014-08-07
Red Hat RHSA-2014:1025-01 kernel 2014-08-06
Debian DSA-2992-1 kernel 2014-07-29
Oracle ELSA-2014-3049 kernel 2014-07-24
Fedora FEDORA-2014-8487 kernel 2014-07-25
CentOS CESA-2014:0923 kernel 2014-07-25
CentOS CESA-2014:0924 kernel 2014-07-25
Scientific Linux SLSA-2014:0924-1 kernel 2014-07-24
Oracle ELSA-2014-0923 kernel 2014-07-23
Oracle ELSA-2014-0924 kernel 2014-07-23
Red Hat RHSA-2014:0923-01 kernel 2014-07-23
Red Hat RHSA-2014:0924-01 kernel 2014-07-23
Red Hat RHSA-2014:0925-01 kernel 2014-07-23
Fedora FEDORA-2014-8519 kernel 2014-07-20
Ubuntu USN-2284-1 linux-ti-omap4 2014-07-16
Ubuntu USN-2288-1 linux-lts-trusty 2014-07-16
Ubuntu USN-2287-1 linux-lts-saucy 2014-07-16
Ubuntu USN-2286-1 linux-lts-raring 2014-07-16
Ubuntu USN-2285-1 linux-lts-quantal 2014-07-16
Ubuntu USN-2282-1 kernel 2014-07-16
Ubuntu USN-2283-1 kernel 2014-07-16
Ubuntu USN-2289-1 kernel 2014-07-16
Ubuntu USN-2290-1 kernel 2014-07-16
Ubuntu USN-2281-1 EC2 kernel 2014-07-16

Comments (none posted)

kernel-rt: information leak

Package(s):kernel-rt CVE #(s):CVE-2014-4027
Created:July 23, 2014 Updated:July 23, 2014
Description: From the CVE entry:

The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.

Alerts:
Oracle ELSA-2015-3012 kernel 2015-03-19
Oracle ELSA-2015-3012 kernel 2015-03-19
Oracle ELSA-2015-0290 kernel 2015-03-12
Oracle ELSA-2014-3103 kernel 2014-12-11
Oracle ELSA-2014-3104 kernel 2014-12-11
Oracle ELSA-2014-3103 kernel 2014-12-11
Oracle ELSA-2014-3104 kernel 2014-12-11
Scientific Linux SLSA-2014:1971-1 kernel 2014-12-10
Oracle ELSA-2014-1971 kernel 2014-12-09
CentOS CESA-2014:1971 kernel 2014-12-10
Red Hat RHSA-2014:1971-01 kernel 2014-12-09
SUSE SUSE-SU-2014:1316-1 Linux kernel 2014-10-22
SUSE SUSE-SU-2014:1319-1 Linux kernel 2014-10-23
Ubuntu USN-2335-1 linux-ti-omap4 2014-09-02
Ubuntu USN-2336-1 linux-lts-trusty 2014-09-02
Ubuntu USN-2334-1 kernel 2014-09-02
Ubuntu USN-2337-1 kernel 2014-09-02
Mandriva MDVSA-2014:155 kernel 2014-08-07
Red Hat RHSA-2014:0913-01 kernel-rt 2014-07-22

Comments (none posted)

lz4: denial of service/possible code execution

Package(s):lz4 CVE #(s):CVE-2014-4715
Created:July 17, 2014 Updated:July 25, 2014
Description: From the CVE entry:

Yann Collet LZ4 before r119, when used on certain 32-bit platforms that allocate memory beyond 0x80000000, does not properly detect integer overflows, which allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run, a different vulnerability than CVE-2014-4611.

Alerts:
openSUSE openSUSE-SU-2014:1677-1 kernel 2014-12-21
Fedora FEDORA-2014-8112 lz4 2014-07-17
Fedora FEDORA-2014-8099 lz4 2014-07-17

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):firefox thunderbird seamonkey CVE #(s):CVE-2014-1547 CVE-2014-1555 CVE-2014-1556 CVE-2014-1557
Created:July 23, 2014 Updated:August 11, 2014
Description: From the Red Hat advisory:

Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1547, CVE-2014-1555, CVE-2014-1556, CVE-2014-1557)

Alerts:
Gentoo 201504-01 firefox 2015-04-07
Mageia MGASA-2014-0419 iceape 2014-10-23
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
openSUSE openSUSE-SU-2014:0976-1 thunderbird 2014-08-11
Fedora FEDORA-2014-9147 xulrunner 2014-08-09
Fedora FEDORA-2014-8809 thunderbird 2014-08-09
SUSE SUSE-SU-2014:0960-1 firefox 2014-08-02
openSUSE openSUSE-SU-2014:0950-1 Mozilla 2014-07-30
openSUSE openSUSE-SU-2014:0939-1 firefox 2014-07-30
Mageia MGASA-2014-0293 nss, firefox, thunderbird 2014-07-26
Fedora FEDORA-2014-8797 thunderbird 2014-07-28
Fedora FEDORA-2014-8763 firefox 2014-07-26
Slackware SSA:2014-204-02 firefox 2014-07-23
Slackware SSA:2014-204-03 thunderbird 2014-07-23
Oracle ELSA-2014-0741 firefox 2014-07-23
Oracle ELSA-2014-0919 firefox 2014-07-23
Oracle ELSA-2014-0919 firefox 2014-07-23
Fedora FEDORA-2014-8736 firefox 2014-07-24
Debian DSA-2986-1 iceweasel 2014-07-23
CentOS CESA-2014:0921 httpd 2014-07-23
Ubuntu USN-2296-1 thunderbird 2014-07-22
Ubuntu USN-2295-1 firefox 2014-07-22
Scientific Linux SLSA-2014:0918-1 thunderbird 2014-07-22
Scientific Linux SLSA-2014:0919-1 firefox 2014-07-23
Oracle ELSA-2014-0918 thunderbird 2014-07-22
Oracle ELSA-2014-0919 firefox 2014-07-23
CentOS CESA-2014:0918 thunderbird 2014-07-23
CentOS CESA-2014:0918 thunderbird 2014-07-23
CentOS CESA-2014:0919 firefox, xulrunner 2014-07-23
CentOS CESA-2014:0919 firefox 2014-07-23
CentOS CESA-2014:0919 firefox 2014-07-23
Red Hat RHSA-2014:0918-01 thunderbird 2014-07-22
Red Hat RHSA-2014:0919-01 firefox 2014-07-22
Debian DSA-2996-1 icedove 2014-08-03

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):firefox thunderbird seamonkey CVE #(s):CVE-2014-1548 CVE-2014-1549 CVE-2014-1550 CVE-2014-1561 CVE-2014-1558 CVE-2014-1559 CVE-2014-1560 CVE-2014-1552
Created:July 23, 2014 Updated:January 26, 2015
Description: From the Ubuntu advisory:

Christian Holler, David Keeler, Byron Campen, Gary Kwong, Jesse Ruderman, Andrew McCreight, Alon Zakai, Bobby Holley, Jonathan Watt, Shu-yu Guo, Steve Fink, Terrence Cole, Gijs Kruitbosch and Cătălin Badea discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2014-1548)

Atte Kettunen discovered a buffer overflow when interacting with WebAudio buffers. An attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2014-1549)

Atte Kettunen discovered a use-after-free in WebAudio. An attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2014-1550)

David Chan and Gijs Kruitbosch discovered that web content could spoof UI customization events in some circumstances, resulting in a limited ability to move UI icons. (CVE-2014-1561)

Christian Holler discovered several issues when parsing certificates with non-standard character encoding, resulting in the inability to use valid SSL certificates in some circumstances. (CVE-2014-1558, CVE-2014-1559, CVE-2014-1560)

Boris Zbarsky discovered that network redirects could cause an iframe to escape the confinements defined by its sandbox attribute in some circumstances. An attacker could potentially exploit this to conduct cross-site scripting attacks. (CVE-2014-1552)

Alerts:
Gentoo 201504-01 firefox 2015-04-07
openSUSE openSUSE-SU-2015:0138-1 Firefox 2015-01-25
Mageia MGASA-2014-0419 iceape 2014-10-23
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
openSUSE openSUSE-SU-2014:0976-1 thunderbird 2014-08-11
SUSE SUSE-SU-2014:0960-1 firefox 2014-08-02
openSUSE openSUSE-SU-2014:0950-1 Mozilla 2014-07-30
openSUSE openSUSE-SU-2014:0939-1 firefox 2014-07-30
Fedora FEDORA-2014-8797 thunderbird 2014-07-28
Fedora FEDORA-2014-8763 firefox 2014-07-26
Ubuntu USN-2296-1 thunderbird 2014-07-22
Ubuntu USN-2295-1 firefox 2014-07-22

Comments (none posted)

mysql: unidentified vulnerabilities

Package(s):mysql-5.5 CVE #(s):CVE-2014-2494 CVE-2014-4207 CVE-2014-4258 CVE-2014-4260
Created:July 17, 2014 Updated:July 28, 2014
Description: From the Ubuntu advisory:

Multiple security issues were discovered in MySQL and this update includes a new upstream MySQL version to fix these issues. MySQL has been updated to 5.5.38.

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-38.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Alerts:
SUSE SUSE-SU-2015:0743-1 mariadb 2015-04-21
Mandriva MDVSA-2015:091 mariadb 2015-03-28
Red Hat RHSA-2014:1937-01 mariadb-galera 2014-12-02
Red Hat RHSA-2014:1940-01 mariadb-galera 2014-12-02
Oracle ELSA-2014-1859 mysql55-mysql 2014-11-17
Oracle ELSA-2014-1861 mariadb 2014-11-17
Scientific Linux SLSA-2014:1861-1 mariadb 2014-11-17
CentOS CESA-2014:1859 mysql55-mysql 2014-11-17
CentOS CESA-2014:1861 mariadb 2014-11-17
Scientific Linux SLSA-2014:1859-1 mysql55-mysql 2014-11-17
Red Hat RHSA-2014:1860-01 mysql55-mysql 2014-11-17
Red Hat RHSA-2014:1859-01 mysql55-mysql 2014-11-17
Red Hat RHSA-2014:1862-01 mariadb55-mariadb 2014-11-17
Red Hat RHSA-2014:1861-01 mariadb 2014-11-17
SUSE SUSE-SU-2014:1072-1 MySQL 2014-08-28
Mageia MGASA-2014-0299 mariadb 2014-07-26
Debian DSA-2985-1 mysql-5.5 2014-07-22
Ubuntu USN-2291-1 mysql-5.5 2014-07-17

Comments (none posted)

nss: code execution

Package(s):nss CVE #(s):CVE-2014-1544
Created:July 23, 2014 Updated:November 12, 2014
Description: From the Red Hat advisory:

A race condition was found in the way NSS verified certain certificates. A remote attacker could use this flaw to crash an application using NSS or, possibly, execute arbitrary code with the privileges of the user running that application.

Alerts:
Gentoo 201504-01 firefox 2015-04-07
Mandriva MDVSA-2015:059 nss 2015-03-13
Debian DSA-3071-1 nss 2014-11-11
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Ubuntu USN-2343-1 nss 2014-09-09
Red Hat RHSA-2014:1165-01 nss 2014-09-08
openSUSE openSUSE-SU-2014:0976-1 thunderbird 2014-08-11
SUSE SUSE-SU-2014:0960-1 firefox 2014-08-02
openSUSE openSUSE-SU-2014:0950-1 Mozilla 2014-07-30
openSUSE openSUSE-SU-2014:0939-1 firefox 2014-07-30
Mandriva MDVSA-2014:139 nss 2014-07-29
Mageia MGASA-2014-0293 nss, firefox, thunderbird 2014-07-26
Oracle ELSA-2014-0916 nss, nspr 2014-07-23
Debian DSA-2986-1 iceweasel 2014-07-23
Ubuntu USN-2296-1 thunderbird 2014-07-22
Ubuntu USN-2295-1 firefox 2014-07-22
Scientific Linux SLSA-2014:0916-1 nss and nspr 2014-07-22
Scientific Linux SLSA-2014:0917-1 nss and nspr 2014-07-22
Oracle ELSA-2014-0917 nss, nspr 2014-07-22
Oracle ELSA-2014-0916 nss, nspr 2014-07-23
CentOS CESA-2014:0916 nss, nspr 2014-07-23
CentOS CESA-2014:0917 nss, nspr 2014-07-23
CentOS CESA-2014:0917 nss, nspr 2014-07-23
CentOS CESA-2014:0917 nss, nspr 2014-07-23
CentOS CESA-2014:0916 nss, nspr 2014-07-23
CentOS CESA-2014:0916 nss, nspr 2014-07-23
Red Hat RHSA-2014:0917-01 nss, nspr 2014-07-22
Red Hat RHSA-2014:0916-01 nss, nspr 2014-07-22
Red Hat RHSA-2014:0915-01 nss 2014-07-22
Debian DSA-2996-1 icedove 2014-08-03

Comments (none posted)

ocsinventory: cross-site scripting

Package(s):ocsinventory CVE #(s):CVE-2014-4722
Created:July 21, 2014 Updated:August 8, 2014
Description: From the CVE entry:

Multiple cross-site scripting (XSS) vulnerabilities in the OCS Reports Web Interface in OCS Inventory NG allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Alerts:
Mageia MGASA-2014-0317 ocsinventory 2014-08-05
Mandriva MDVSA-2014:156 ocsinventory 2014-08-07
Fedora FEDORA-2014-8218 ocsinventory 2014-07-19
Fedora FEDORA-2014-8227 ocsinventory 2014-07-19

Comments (none posted)

openjdk-6: unspecified vulnerability

Package(s):openjdk-6 CVE #(s):CVE-2014-4268
Created:July 18, 2014 Updated:September 2, 2014
Description:

From the CVE entry:

Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.

Alerts:
SUSE SUSE-SU-2015:0376-1 java-1_5_0-ibm 2015-02-25
Gentoo 201502-12 oracle-jre-bin 2015-02-15
SUSE SUSE-SU-2015:0392-1 java-1_6_0-ibm 2015-02-27
openSUSE openSUSE-SU-2014:1645-1 java-1_7_0-openjdk 2014-12-15
openSUSE openSUSE-SU-2014:1638-1 java-1_7_0-openjdk 2014-12-15
Ubuntu USN-2319-3 OpenJDK 7 2014-09-16
Debian DSA-2987-2 openjdk-7 2014-08-31
Ubuntu USN-2319-2 openjdk-7 2014-08-25
Ubuntu USN-2319-1 openjdk-7 2014-08-19
Ubuntu USN-2312-1 openjdk-6 2014-08-12
Debian DSA-2987-1 openjdk-7 2014-07-23
SUSE SUSE-SU-2014:0961-1 openjdk 2014-08-04
Debian DSA-2980-1 openjdk-6 2014-07-17

Comments (none posted)

php-ZendFramework: SQL injection

Package(s):php-ZendFramework CVE #(s):CVE-2014-4914
Created:July 22, 2014 Updated:August 6, 2014
Description: From the Zend framework advisory:

The implementation of the ORDER BY SQL statement in Zend_Db_Select of Zend Framework 1 contains a potential SQL injection when the query string passed contains parentheses.

Alerts:
Debian-LTS DLA-251-2 zendframework 2015-06-23
Debian-LTS DLA-251-1 zendframework 2015-06-20
Debian DSA-3265-2 zendframework 2015-05-24
Debian DSA-3265-1 zendframework 2015-05-20
Mandriva MDVSA-2015:097 php-ZendFramework 2015-03-28
Fedora FEDORA-2014-12418 php-ZendFramework 2014-10-17
Fedora FEDORA-2014-12344 php-ZendFramework 2014-10-17
Mageia MGASA-2014-0311 php-ZendFramework 2014-08-05
Mandriva MDVSA-2014:145 php-ZendFramework 2014-07-31
Fedora FEDORA-2014-8309 php-ZendFramework 2014-07-22
Fedora FEDORA-2014-8308 php-ZendFramework 2014-07-22

Comments (none posted)

polarssl: denial of service

Package(s):polarssl CVE #(s):CVE-2014-4911
Created:July 18, 2014 Updated:August 6, 2014
Description:

From the Debian advisory:

A flaw was discovered in PolarSSL, a lightweight crypto and SSL/TLS library, which can be exploited by a remote unauthenticated attacker to mount a denial of service against PolarSSL servers that offer GCM ciphersuites. Potentially clients are affected too if a malicious server decides to execute the denial of service attack against its clients.

Alerts:
Mageia MGASA-2015-0185 hiawatha 2015-05-05
Mageia MGASA-2014-0315 polarssl 2014-08-05
Fedora FEDORA-2014-8310 polarssl 2014-07-22
Fedora FEDORA-2014-8316 polarssl 2014-07-22
Debian DSA-2981-1 polarssl 2014-07-18

Comments (none posted)

privoxy: privoxy requires privoxyd

Package(s):privoxy CVE #(s):
Created:July 21, 2014 Updated:July 23, 2014
Description: From the openSUSE advisory:

privoxy-3.0.16-networkmanager.systemd.patch: update Networkmanager dispatcher to reload config of privoxy with systemd (bnc#862339)

Alerts:
openSUSE openSUSE-SU-2014:0923-1 privoxy 2014-07-21

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2014, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds