|
|
Log in / Subscribe / Register

Security

Filesystem fuzzing

By Jake Edge
March 18, 2015

Vault 2015

At the inaugural Vault conference, Sasha Levin gave a presentation on filesystem fuzzing—deliberately providing random bad input to the kernel to try to find bugs. He described different kinds of fuzzing, along with giving examples of some security bugs that were found. The conference itself focused on Linux storage and filesystems and was held March 11-12 in Boston. It attracted around 400 attendees, which has led the Linux Foundation to schedule another Vault for next year in Raleigh, North Carolina.

Levin started by saying that Linux has a problem with "shitty code". That's not because the developers are not skilled, nor is it that code review is going by the wayside. The biggest problem is that the code does not get all that much testing until after it is merged into the mainline. At that point, users get their hands on it and start to find bugs.

Kernel testing

Testing the kernel is done by multiple groups in the ecosystem. Developers will run some tests against their code; for filesystems those tests might include xfstests. Quality assurance (QA) groups will also run tests, but those are typically limited to existing test suites with a known set of tests. The kernel is a "big, scary machine", he said, and it needs more testing.

There are two different kinds of testing: manual and automated. Manual tests are typically run by developers based on the code they changed. If a developer changes the open() call, for example, they "poke it a little bit" to see if anything is broken. That kind of testing is slow and requires a human to create, run, and interpret the tests. It doesn't really scale so that multiple testers could get involved, either.

Automated tests essentially perform the manual tests automatically. Once a test suite covers the basics, though, people stop adding tests except to check for regressions. There is not much done with these test suites (such as the Linux Test Project, xfstests, Filebench, IOzone, and others) to find new bugs. In addition, there is no real effort to test new features.

Users test the code by doing their normal work. They may have a technical background, but they did not review the patches and are not working on the filesystem. They are just trying to get their work done and have not set out to test anything.

There are some things missing from today's testing. Test developers don't try to guess what users will or won't do so that tests cover the corner cases. Test suites generally just check for regressions. In addition, there is little imagination that goes into test development, since creating new features is much more interesting to developers than creating new tests.

For example, he mentioned the __GFP_NOFAIL issues that have been discussed in kernel forums (including the Linux Storage, Filesystem, and Memory Management (LSFMM) Summit) recently. Dave Chinner added tests to xfstests to observe that problem, but only after the problems had been hit. That means that someone ran into those problems and ended up with a corrupted filesystem. It would be nice to find those kinds of problems before someone hits them and ends up complaining about a "shitty kernel", he said.

Fuzzing

Fuzzing is a technique that effectively creates new tests on the fly. Some of those tests are stupid, but others may find bugs. In addition, fuzzing frameworks tend to be heavily threaded which puts a different kind of load on filesystems. The existing test suites do put a load on the filesystem, but it is basically the same load over and over again. So fuzzing can help test concurrency in the filesystem as well.

"Structure fuzzing" simply takes a filesystem image, makes some changes to it, and then tries to mount it. Some of those tests have found kernel crashes or panics at mount time. But not every corruption can or will be found at mount time because that is too expensive to check. Testing with other operations will show whether the corruption is handled appropriately post-mount.

But just flipping every bit in the filesystem image doesn't really make too much sense as a test. That's where "smart structure fuzzing" comes into play. This kind of testing is filesystem-specific as it must have some knowledge of the structure of the filesystem. Since that structure can't really change often (it resides on-disk), this kind of testing does not need to be done all of the time. It can be run occasionally, especially when there are changes that might affect the binary format.

"API fuzzing" is more popular, Levin said. It typically fuzzes the virtual filesystem (VFS) layer, so it is not necessarily filesystem-specific. Basically, API fuzzing tries passing lots of different values to the system calls to see if it can break something.

"Smart API fuzzing" takes that one step further by incorporating knowledge about the kinds of values that make sense as parameters to the system calls. For example, chmod() takes a path and a mode. The first check in chmod() is to see if the mode value is reasonable, so sending all of the 216 possibilities doesn't make sense all of the time. Doing that occasionally is useful, but it is overkill to test the same error path over and over.

As an example of what this kind of fuzzing can find, Levin pointed to CVE-2015-1420. It is an invalid memory access in open_by_handle_at() that was found because the fuzzer knew what the function expects. In a multithreaded test, it was able to change the size in a structure between the time it was used for allocating a buffer and the time it was used to actually read the data. Since the fuzzer had knowledge of the parameters and their types, it could change them in multiple threads.

Having many threads all accessing the filesystem is a place where fuzzers shine. For example, simulating 10,000 users is easy, which can help catch untested scenarios, he said. It makes it easier to catch problems where a lot of load is needed to hit them.

CVE-2014-4171 was an example of a bug that needed a high load to find. It is a local denial of service that can happen when accessing the region around a hole in a file using mmap() while that hole is being punched in another thread. It was easy to see in the code once it was discovered, but it was only found under heavy load from the fuzzer.

That is one of the benefits of fuzzing, he said, that it creates tests that no filesystem developer would ever think of. It will do things that are not reasonable and don't make any sense. For example, CVE-2014-8086 is a race condition that was discovered when switching between asynchronous I/O and direct I/O, which is something that "no one really does". But a malicious user can, of course.

It is nice to know that some set of tests cover most or all of the lines of code of interest, but it does not mean that the code is right. There are multiple paths through any code, so it is important to have lots of threads exercising different paths from different places. Executing rarely used paths is useful as well.

Disadvantages

There are some disadvantages to fuzzing, though. For one thing, there is no pass/fail criteria. Since it is random, you can't say that if it runs for an hour it is considered a "pass". It may miss completely obvious errors. As Peter Zijlstra put it, running for some length of time "doesn't mean that the behavior is right, just that it didn't explode". There may be plenty of bugs lurking that just don't cause a big enough problem to crash the test (or the kernel).

Fuzzing really needs to run continuously, Levin said. It can't just be run overnight and checked in the morning. Instead it should be run continuously and checked daily. Fuzzing is a resource hog too, but that actually helps testing the memory management code, especially for huge pages. The tests split lots of pages and make it hard to collapse them back into huge pages, he said.

Reproducing bugs found by the fuzzer can be quite difficult. Unfortunately, the right answer for causing the bug to happen again is often "run the fuzzer and wish for the best". It is difficult to output the results of tests because the amount of data slows the system down. Things like the last system call made aren't all that helpful, he said. Intel's Processor Trace (which Levin learned about at LSFMM) may help the situation eventually.

Levin suggested that the community should be doing more fuzzing. Developers should be doing some fuzzing before they send in patches and QA folks should be fuzzing continuously. A QA person in the audience asked about getting more information out of the kernel when it fails from fuzzing. Levin suggested setting up the kernel to do a memory dump when it gets a BUG_ON(). He will also be working on better BUG_ON() reporting.

He uses the Trinity fuzz tester for all of the API fuzzing and a different, unnamed tool for filesystem structure fuzzing. He runs Trinity in a virtual machine, while Trinity developer Dave Jones runs it on real hardware, so they find different kinds of bugs. Levin has not gotten to the point where he can run Trinity on linux-next for a week without hitting problems; so far he has not needed to look anywhere else for fuzzing tests.

[I would like to thank the Linux Foundation for travel support to Boston for Vault.]

Comments (8 posted)

Brief items

Security quotes of the week

Why spy? Because it’s cheaper than playing fair. Our networks have given the edge to the elites, and unless we seize the means of information, we are headed for a long age of IT-powered feudalism, where property is the exclusive domain of the super-rich, where your surveillance-supercharged Internet of Things treats you as a tenant-farmer of your life, subject to a licence agreement instead of a constitution.
Cory Doctorow

In a recent article by Scahill and Begley, we learned that the CIA is interested in targeting Apple products. I largely agree with the quote from Steve Bellovin, that “spies gonna spy”, so of course they’re interested in targeting the platform that rides in the pockets of many of their intelligence collection targets. What could be a tastier platform for intelligence collection than a device with a microphone, cellular network connection, GPS, and a battery, which your targets willingly carry around in their pockets? Even better, your targets will spare you the trouble of recharging your spying device for you. Of course you target their iPhones! (And Androids. And Blackberries.)

To my mind, the real eyebrow raising moment was that the CIA is also allegedly targeting app developers through “whacking” Apple’s Xcode tool, presumably allowing all subsequent software shipped from the developer to the app store to contain some sort of malicious implant, which will then be distributed within that developer’s app. Nothing has been disclosed about how widespread these attacks are (if ever used at all), what developers might have been targeted, or how the implants might function.

Dan Wallach

Comments (none posted)

New vulnerabilities

389-admin: multiple /tmp/ file vulnerabilities

Package(s):389-admin CVE #(s):CVE-2015-0233
Created:March 16, 2015 Updated:March 18, 2015
Description: From the Red Hat bugzilla:

Kurt Seifried of Red Hat Product Security reports:

There are several temporary file creation vulnerabilities:

In the file

./389-admin-1.1.36/admserv/newinst/src/AdminServer.pm.in

my $secfile_backup_dir = "/tmp/adm-sec-files." . $$;

and in the file:

./389-admin-1.1.36/lib/libadmin/httpcon.c

char *dbd = "/tmp/http_trace.%d";

The perl code should use mkstemp() and the C code should use mkstemp().

These issues are only locally exploitable and require administrative action in order to exploit.

Alerts:
Fedora FEDORA-2015-1711 389-admin 2015-03-15

Comments (none posted)

checkpw: denial of service

Package(s):checkpw CVE #(s):CVE-2015-0885
Created:March 17, 2015 Updated:March 18, 2015
Description: From the Debian advisory:

Hiroya Ito of GMO Pepabo, Inc. reported that checkpw, a password authentication program, has a flaw in processing account names which contain double dashes. A remote attacker can use this flaw to cause a denial of service (infinite loop).

Alerts:
Debian-LTS DLA-191-1 checkpw 2015-04-09
Debian DSA-3192-1 checkpw 2015-03-17

Comments (none posted)

cups-filters: remote command execution

Package(s):cups-filters CVE #(s):CVE-2015-2265
Created:March 16, 2015 Updated:April 7, 2015
Description: From the Red Hat bugzilla:

It was reported that cups-browsed fails to properly sanitize data from the network when creating IPP printer scripts. As a result, an attacker can remotely create a script containing arbitrary commands, which will be executed as the "lp" user when the associated printer is used.

This is the same vulnerability reported as CVE-2014-2707 but the existing fixes rely on a string sanitization function remove_bad_chars() which is not effective.

Alerts:
openSUSE openSUSE-SU-2015:1244-1 cups-filters 2015-07-14
Mandriva MDVSA-2015:196 cups-filters 2015-04-07
Mageia MGASA-2015-0132 cups-filters 2015-04-04
Ubuntu USN-2532-1 cups-filters 2015-03-16
Fedora FEDORA-2015-3036 cups-filters 2015-03-13
Fedora FEDORA-2015-3003 cups-filters 2015-03-13

Comments (none posted)

freexl: denial of service

Package(s):freexl CVE #(s):
Created:March 18, 2015 Updated:March 18, 2015
Description: From the FreeXL advisory:

Four potentially harmful bugs causing crash and stack corruption were detected in FreeXL by American Fuzzy Lop. The most recent version of FreeXL solves all four issues.

Alerts:
Fedora FEDORA-2015-3372 freexl 2015-03-18
Fedora FEDORA-2015-3471 freexl 2015-03-18

Comments (none posted)

gnupg: denial of service

Package(s):gnupg CVE #(s):CVE-2015-1606
Created:March 13, 2015 Updated:March 18, 2015
Description:

From the Debian advisory:

The keyring parsing code did not properly reject certain packet types not belonging in a keyring, which caused an access to memory already freed. This could allow remote attackers to cause a denial of service (crash) via crafted keyring files.

Alerts:
openSUSE openSUSE-SU-2015:2241-1 gpg2 2015-12-10
openSUSE openSUSE-SU-2015:2153-1 GnuPG 2015-11-30
Mageia MGASA-2015-0359 gnupg 2015-09-13
Ubuntu USN-2554-1 gnupg, gnupg2 2015-04-01
Debian-LTS DLA-175-1 gnupg 2015-03-17
Debian DSA-3184-1 gnupg 2015-03-12

Comments (none posted)

gnutls26: two vulnerabilities

Package(s):gnutls26 CVE #(s):CVE-2015-0282 CVE-2015-0294
Created:March 16, 2015 Updated:July 30, 2015
Description: From the Debian advisory:

CVE-2015-0282: GnuTLS does not verify the RSA PKCS #1 signature algorithm to match the signature algorithm in the certificate, leading to a potential downgrade to a disallowed algorithm without detecting it.

CVE-2015-0294: It was reported that GnuTLS does not check whether the two signature algorithms match on certificate import.

Alerts:
Mageia MGASA-2015-0322 gnutls 2015-08-25
Scientific Linux SLSA-2015:1457-1 gnutls 2015-08-03
Oracle ELSA-2015-1457 gnutls 2015-07-29
Red Hat RHSA-2015:1457-01 gnutls 2015-07-22
openSUSE openSUSE-SU-2015:0622-1 gnutls 2015-03-30
Debian-LTS DLA-180-1 gnutls26 2015-03-25
Ubuntu USN-2540-1 gnutls26, gnutls28 2015-03-23
Debian DSA-3191-1 gnutls26 2015-03-15

Comments (none posted)

icu: regular expression flaws

Package(s):icu CVE #(s):CVE-2014-9654
Created:March 16, 2015 Updated:April 28, 2015
Description: From the Debian advisory:

CVE-2014-9654: More regular expression flaws.

Alerts:
Fedora FEDORA-2015-16314 icu 2015-10-13
Debian-LTS DLA-219-1 icu 2015-05-14
Fedora FEDORA-2015-6084 icu 2015-04-28
Fedora FEDORA-2015-6087 icu 2015-04-28
Gentoo 201503-06 icu 2015-03-14
Debian DSA-3187-1 icu 2015-03-15

Comments (none posted)

ipa: multiple vulnerabilties

Package(s):ipa CVE #(s):CVE-2014-7850 CVE-2014-7828
Created:March 13, 2015 Updated:March 18, 2015
Description:

From the Oracle advisory:

CVE-2014-7850: XSS flaw can be used to escalate privileges.

CVE-2014-7828: password not required when OTP in use.

Alerts:
Oracle ELSA-2015-0442 ipa 2015-03-12

Comments (none posted)

jBCrypt: integer overflow

Package(s):jBCrypt CVE #(s):CVE-2015-0886
Created:March 16, 2015 Updated:March 18, 2015
Description: From the CVE entry:

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

Alerts:
Fedora FEDORA-2015-2994 jBCrypt 2015-03-13
Fedora FEDORA-2015-3032 jBCrypt 2015-03-13

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2014-8159
Created:March 12, 2015 Updated:May 1, 2015
Description: From the Red Hat advisory:

It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the (u)verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system.

Alerts:
Oracle ELSA-2015-2152 kernel 2015-11-25
SUSE SUSE-SU-2015:1376-1 kernel-rt 2015-08-12
Oracle ELSA-2015-3064 kernel 3.8.13 2015-07-31
Oracle ELSA-2015-3064 kernel 3.8.13 2015-07-31
SUSE SUSE-SU-2015:1491-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1488-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1478-1 kernel 2015-09-02
SUSE SUSE-SU-2015:1489-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1487-1 kernel 2015-09-04
Oracle ELSA-2015-1081 kernel 2015-06-09
Oracle ELSA-2015-3035 kernel 2015-05-13
Oracle ELSA-2015-3035 kernel 2015-05-13
Oracle ELSA-2015-3036 kernel 2015-05-13
Oracle ELSA-2015-3036 kernel 2015-05-13
Mageia MGASA-2015-0219 kernel-tmb 2015-05-13
Oracle ELSA-2015-0987 kernel 2015-05-12
Debian-LTS DLA-246-1 linux-2.6 2015-06-17
Mageia MGASA-2015-0172 kernel-linus 2015-04-30
Mageia MGASA-2015-0171 kernel 2015-04-30
Red Hat RHSA-2015:0919-01 kernel 2015-04-30
Debian DSA-3237-1 kernel 2015-04-26
Oracle ELSA-2015-0864 kernel 2015-04-21
Red Hat RHSA-2015:0870-01 kernel 2015-04-22
Red Hat RHSA-2015:0803-01 kernel 2015-04-14
Ubuntu USN-2561-1 linux-ti-omap4 2015-04-08
Oracle ELSA-2015-0783 kernel 2015-04-08
Scientific Linux SLSA-2015:0783-1 kernel 2015-04-07
CentOS CESA-2015:0783 kernel 2015-04-07
Red Hat RHSA-2015:0783-01 kernel 2015-04-07
Fedora FEDORA-2015-5024 kernel 2015-04-07
Red Hat RHSA-2015:0782-01 kernel 2015-04-07
CentOS CESA-2015:0726 kernel 2015-04-01
SUSE SUSE-SU-2015:1071-1 kernel 2015-06-16
Red Hat RHSA-2015:0751-01 kernel-rt 2015-03-30
Scientific Linux SLSA-2015:0726-1 kernel 2015-03-26
Oracle ELSA-2015-0726 kernel 2015-03-26
Debian-LTS DLA-246-2 linux-2.6 2015-06-17
Red Hat RHSA-2015:0727-01 kernel-rt 2015-03-26
Red Hat RHSA-2015:0726-01 kernel 2015-03-26
Fedora FEDORA-2015-4059 kernel 2015-03-21
Red Hat RHSA-2015:0695-01 kernel 2015-03-17
Ubuntu USN-2525-1 kernel 2015-03-11
Ubuntu USN-2530-1 kernel 2015-03-11
Oracle ELSA-2015-0674 kernel 2015-03-11
Ubuntu USN-2529-1 linux-lts-utopic 2015-03-11
Ubuntu USN-2526-1 kernel 2015-03-11
CentOS CESA-2015:0674 kernel 2015-03-12
Ubuntu USN-2527-1 linux-lts-trusty 2015-03-11
Ubuntu USN-2528-1 kernel 2015-03-11
Scientific Linux SLSA-2015:0674-1 kernel 2015-03-12
Red Hat RHSA-2015:0674-01 kernel 2015-03-11

Comments (none posted)

libav: denial of service

Package(s):libav CVE #(s):CVE-2014-9604
Created:March 16, 2015 Updated:May 19, 2015
Description: From the CVE entry:

libavcodec/utvideodec.c in FFmpeg before 2.5.2 does not check for a zero value of a slice height, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Ut Video data, related to the (1) restore_median and (2) restore_median_il functions.

Alerts:
Gentoo 201603-06 ffmpeg 2016-03-12
Mageia MGASA-2015-0245 ffmpeg 2015-06-19
Mageia MGASA-2015-0233 avidemux 2015-05-18
Ubuntu USN-2534-1 libav 2015-03-17
Debian DSA-3189-1 libav 2015-03-15

Comments (none posted)

libxfont: privilege escalation

Package(s):libxfont CVE #(s):CVE-2015-1802 CVE-2015-1803 CVE-2015-1804
Created:March 17, 2015 Updated:December 21, 2015
Description: From the X.org advisory:

Ilja van Sprundel, a security researcher with IOActive, has discovered an issue in the parsing of BDF font files by libXfont. Additional testing by Alan Coopersmith and William Robinet with the American Fuzzy Lop (afl) tool uncovered two more issues in the parsing of BDF font files.

As libXfont is used by the X server to read font files, and an unprivileged user with access to the X server can tell the X server to read a given font file from a path of their choosing, these vulnerabilities have the potential to allow unprivileged users to run code with the privileges of the X server (often root access).

Alerts:
openSUSE openSUSE-SU-2015:2300-1 libXfont 2015-12-18
Oracle ELSA-2015-1708 libXfont 2015-09-03
Oracle ELSA-2015-1708 libXfont 2015-09-03
Gentoo 201507-21 libXfont 2015-07-22
Scientific Linux SLSA-2015:1708-1 libXfont 2015-09-03
CentOS CESA-2015:1708 libXfont 2015-09-03
Red Hat RHSA-2015:1708-01 libXfont 2015-09-03
CentOS CESA-2015:1708 libXfont 2015-09-03
SUSE SUSE-SU-2015:0702-1 libXfont 2015-04-10
SUSE SUSE-SU-2015:0674-1 xorg-x11-libs 2015-04-07
Mandriva MDVSA-2015:145-1 libxfont 2015-03-30
Debian-LTS DLA-183-1 libxfont 2015-03-28
Mandriva MDVSA-2015:145 libxfont 2015-03-29
Arch Linux ASA-201503-15 libxfont 2015-03-17
openSUSE openSUSE-SU-2015:0614-1 libXfont 2015-03-27
Mageia MGASA-2015-0113 libxfont 2015-03-24
Fedora FEDORA-2015-4230 libXfont 2015-03-23
Ubuntu USN-2536-1 libxfont 2015-03-18
Debian DSA-3194-1 libxfont 2015-03-17

Comments (none posted)

movabletype-opensource: multiple vulnerabilities

Package(s):movabletype-opensource CVE #(s):CVE-2013-2184 CVE-2014-9057 CVE-2015-1592
Created:March 13, 2015 Updated:March 18, 2015
Description:

From the Debian advisory:

CVE-2013-2184 - Unsafe use of Storable::thaw in the handling of comments to blog posts could allow remote attackers to include and execute arbitrary local Perl files or possibly remotely execute arbitrary code.

CVE-2014-9057 - Netanel Rubin from Check Point Software Technologies discovered a SQL injection vulnerability in the XML-RPC interface allowing remote attackers to execute arbitrary SQL commands.

CVE-2015-1592 - The Perl Storable::thaw function is not properly used, allowing remote attackers to include and execute arbitrary local Perl files and possibly remotely execute arbitrary code.

Alerts:
Debian DSA-3183-1 movabletype-opensource 2015-03-12

Comments (none posted)

osc: command injection

Package(s):osc CVE #(s):CVE-2015-0778
Created:March 13, 2015 Updated:March 7, 2016
Description:

From the openSUSE bug report:

Server and client side arbitrary command execution in source service handling of OBS.

Alerts:
Gentoo 201603-02 osc 2016-03-06
Fedora FEDORA-2015-4549 osc 2015-04-05
Fedora FEDORA-2015-4482 osc 2015-04-05
SUSE SUSE-SU-2015:0487-1 osc 2015-03-12
openSUSE openSUSE-SU-2015:0486-1 osc 2015-03-12

Comments (none posted)

php5: code execution

Package(s):php5 CVE #(s):CVE-2015-2301
Created:March 18, 2015 Updated:March 23, 2015
Description: From the Ubuntu advisory:

It was discovered that PHP incorrectly handled memory in the phar extension. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code.

Alerts:
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
Gentoo 201606-10 php 2016-06-19
Scientific Linux SLSA-2015:1218-1 php 2015-07-09
Oracle ELSA-2015-1218 php 2015-07-09
CentOS CESA-2015:1218 php 2015-07-09
Red Hat RHSA-2015:1218-01 php 2015-07-09
Scientific Linux SLSA-2015:1135-1 php 2015-06-24
Oracle ELSA-2015-1135 php 2015-06-23
CentOS CESA-2015:1135 php 2015-06-24
Red Hat RHSA-2015:1135-01 php 2015-06-23
SUSE SUSE-SU-2015:0868-1 php5 2015-05-13
Red Hat RHSA-2015:1053-01 php55 2015-06-04
Debian-LTS DLA-212-1 php5 2015-04-29
Slackware SSA:2015-111-10 php 2015-04-21
openSUSE openSUSE-SU-2015:0644-1 php5 2015-04-01
Red Hat RHSA-2015:1066-01 php54 2015-06-04
Debian DSA-3198-2 php5 2015-03-28
Mandriva MDVSA-2015:080 php 2015-03-28
Mandriva MDVSA-2015:079 php 2015-03-28
Debian DSA-3198-1 php5 2015-03-20
Ubuntu USN-2535-1 php5 2015-03-18

Comments (none posted)

php5: two vulnerabilities

Package(s):php5 CVE #(s):CVE-2014-9705 CVE-2015-2305
Created:March 18, 2015 Updated:May 13, 2015
Description: From the Debian advisory:

CVE-2014-9705: Buffer overflow in the enchant extension.

CVE-2015-2305: Guido Vranken discovered a heap overflow in the ereg extension (only applicable to 32 bit systems).

Alerts:
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
Gentoo 201606-10 php 2016-06-19
Debian-LTS DLA-444-1 php5 2016-02-29
Scientific Linux SLSA-2015:1218-1 php 2015-07-09
Oracle ELSA-2015-1218 php 2015-07-09
CentOS CESA-2015:1218 php 2015-07-09
Red Hat RHSA-2015:1218-01 php 2015-07-09
Scientific Linux SLSA-2015:1135-1 php 2015-06-24
Oracle ELSA-2015-1135 php 2015-06-23
CentOS CESA-2015:1135 php 2015-06-24
Red Hat RHSA-2015:1135-01 php 2015-06-23
SUSE SUSE-SU-2015:0868-1 php5 2015-05-13
Fedora FEDORA-2015-7378 clamav 2015-05-12
Ubuntu USN-2594-1 clamav 2015-05-05
Mandriva MDVSA-2015:221 clamav 2015-05-04
Red Hat RHSA-2015:1053-01 php55 2015-06-04
SUSE SUSE-SU-2015:0946-1 MySQL 2015-05-26
openSUSE openSUSE-SU-2015:0906-1 clamav 2015-05-19
Mageia MGASA-2015-0190 clamav 2015-05-05
Fedora FEDORA-2015-7334 clamav 2015-05-02
Arch Linux ASA-201505-2 clamav 2015-05-04
Debian-LTS DLA-212-1 php5 2015-04-29
Slackware SSA:2015-111-10 php 2015-04-21
Ubuntu USN-2572-1 php5 2015-04-20
Mageia MGASA-2015-0134 php, libzip 2015-04-04
openSUSE openSUSE-SU-2015:0644-1 php5 2015-04-01
Red Hat RHSA-2015:1066-01 php54 2015-06-04
Fedora FEDORA-2015-4236 php 2015-03-30
Mandriva MDVSA-2015:080 php 2015-03-28
Mandriva MDVSA-2015:079 php 2015-03-28
Fedora FEDORA-2015-4255 php 2015-03-26
Ubuntu USN-2535-1 php5 2015-03-18
Debian DSA-3195-1 php5 2015-03-18

Comments (none posted)

phpMyAdmin: information leak

Package(s):phpMyAdmin CVE #(s):CVE-2015-2206
Created:March 16, 2015 Updated:March 31, 2015
Description: From the CVE entry:

libraries/select_lang.lib.php in phpMyAdmin 4.0.x before 4.0.10.9, 4.2.x before 4.2.13.2, and 4.3.x before 4.3.11.1 includes invalid language values in unknown-language error responses that contain a CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.

Alerts:
Debian-LTS DLA-336-1 phpmyadmin 2015-10-28
Debian DSA-3382-1 phpmyadmin 2015-10-28
openSUSE openSUSE-SU-2015:1191-1 phpMyAdmin 2015-07-04
Mandriva MDVSA-2015:186 phpmyadmin 2015-03-31
Fedora FEDORA-2015-3329 phpMyAdmin 2015-03-14
Fedora FEDORA-2015-3336 phpMyAdmin 2015-03-14

Comments (none posted)

postgresql: buffer overrun

Package(s):postgresql CVE #(s):CVE-2015-0242
Created:March 16, 2015 Updated:March 18, 2015
Description: From the openSUSE advisory:

Fix buffer overrun in replacement *printf() functions

Alerts:
Gentoo 201507-20 postgresql 2015-07-18
Mandriva MDVSA-2015:110 postgresql 2015-03-29
openSUSE openSUSE-SU-2015:0499-1 postgresql 2015-03-14

Comments (none posted)

requests: cookie stealing attacks

Package(s):requests CVE #(s):CVE-2015-2296
Created:March 16, 2015 Updated:June 18, 2015
Description: From the Ubuntu advisory:

Matthew Daley discovered that Requests incorrectly handled cookies without host values when being redirected. A remote attacker could possibly use this issue to perform session fixation or cookie stealing attacks.

Alerts:
Fedora FEDORA-2015-9664 python-requests 2015-06-18
Mageia MGASA-2015-0180 python-pip 2015-05-03
Fedora FEDORA-2015-4084 python-urllib3 2015-03-29
Fedora FEDORA-2015-4084 python-requests 2015-03-29
Mageia MGASA-2015-0120 python-requests 2015-03-27
Mandriva MDVSA-2015:133 python-requests 2015-03-29
Ubuntu USN-2531-1 requests 2015-03-16

Comments (none posted)

suricata: multiple vulnerabilities

Package(s):suricata CVE #(s):CVE-2015-0928
Created:March 13, 2015 Updated:March 18, 2015
Description:

From the Fedora advisory:

This release fixes a parsing issue in the DCERPC parser that can happen when Suricata runs out of memory. The exact scope of the problem isn’t clear, but it could certainly lead to crashes. CVE-2015-0928 is assigned for this.

The second issue is certain characters in the URI could confuse the parsing of the HTTP request line, leading to possible detection bypass for ‘http_uri’ and to incomplete logging of the URI.

Alerts:
Fedora FEDORA-2015-2828 suricata 2015-03-12

Comments (none posted)

tcllib: HTML injection

Package(s):tcllib CVE #(s):
Created:March 16, 2015 Updated:May 7, 2015
Description: The following flaw was reported against tcllib:

User supplied input is directly inserted into the <textarea> as default value, e.g. a textarea named 'ta' with a parameter of ta=XXX results in `<textarea>XXX</textarea>`

This can be used to break out of the <textarea>-context and insert arbitrary HTML content such as <script>-Tags.

The attack is possible using HTTP GET requests as well as POST and multipart form encoded POST requests.

Alerts:
Mageia MGASA-2015-0201 tcl-tcllib 2015-05-07
Fedora FEDORA-2015-3235 tcllib 2015-03-14

Comments (none posted)

tcpdump: multiple vulnerabilities

Package(s):tcpdump CVE #(s):CVE-2015-0261 CVE-2015-2153 CVE-2015-2154 CVE-2015-2155
Created:March 17, 2015 Updated:April 27, 2015
Description: From the Debian advisory:

Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service (application crash) or, potentially, execution of arbitrary code.

Alerts:
Gentoo 201510-04 tcpdump 2015-10-31
Ubuntu USN-2580-1 tcpdump 2015-04-27
Fedora FEDORA-2015-4953 tcpdump 2015-04-18
Mandriva MDVSA-2015:182 tcpdump 2015-03-30
Fedora FEDORA-2015-4939 tcpdump 2015-03-30
Mandriva MDVSA-2015:125 tcpdump 2015-03-29
Arch Linux ASA-201503-20 tcpdump 2015-03-20
openSUSE openSUSE-SU-2015:0616-1 tcpdump 2015-03-27
Mageia MGASA-2015-0114 tcpdump 2015-03-24
Debian-LTS DLA-174-1 tcpdump 2015-03-17
Debian DSA-3193-1 tcpdump 2015-03-17

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2015-2187 CVE-2015-2188 CVE-2015-2189 CVE-2015-2190 CVE-2015-2191 CVE-2015-2192
Created:March 13, 2015 Updated:April 1, 2015
Description:

From the openSUSE bug reports:

CVE-2015-2187 - The ATN-CPDLC dissector could crash.

CVE-2015-2188 - The WCP dissector could crash while decompressing data.

CVE-2015-2189 - The pcapng file parser could crash.

CVE-2015-2190 - The LLDP dissector could crash.

CVE-2015-2191 - The TNEF dissector could go into an infinite loop.

CVE-2015-2192 - The SCSI OSD dissector could go into an infinite loop.

Alerts:
Scientific Linux SLSA-2015:2393-1 wireshark 2015-12-21
Red Hat RHSA-2015:2393-01 wireshark 2015-11-19
Gentoo 201510-03 wireshark 2015-10-31
Scientific Linux SLSA-2015:1460-1 wireshark 2015-08-03
Oracle ELSA-2015-1460 wireshark 2015-07-29
Red Hat RHSA-2015:1460-01 wireshark 2015-07-22
Debian-LTS DLA-198-1 wireshark 2015-04-22
Debian DSA-3210-1 wireshark 2015-03-31
Mandriva MDVSA-2015:183 wireshark 2015-03-30
Mageia MGASA-2015-0117 wireshark 2015-03-27
openSUSE openSUSE-SU-2015:0489-1 wireshark 2015-03-13

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2015, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds