|
|
Log in / Subscribe / Register

Security

Nested NMIs lead to CVE-2015-3290

By Jake Edge
August 26, 2015

Non-maskable interrupts (or NMIs) are a hardware feature that is typically used to signal hardware errors or other unrecoverable faults. They differ from regular interrupts in that they can occur when interrupts are otherwise blocked (i.e. they are not maskable). NMIs can be caused by user-space programs, though, so their handling in the kernel needs to be bulletproof or it can lead to security holes. Since the beginning of 2014, it would seem that NMI handling has been subject to races that allow user-space programs to elevate their privileges—a bug that is known as CVE-2015-3290.

NMIs are used by profiling and debugging tools, such as perf, to determine where in the code the CPU is currently executing. NMIs also get nested, effectively, when an NMI handler causes an exception like a breakpoint or a page fault. Handling that nesting is complicated, which is what went astray and led to the bug.

The first notification about the problem came in a July 22 post to the oss-security mailing list from Andy Lutomirski about a number of NMI-handling security bugs. All are security-related, but one was embargoed to allow distributions to fix it before releasing any details. So he mentioned CVE-2015-3290 without giving any details, though he did include something of a warning: "*Patch your systems*".

The details came in a post-embargo advisory from Lutomirski on August 4. In some detail, he described the problem, but also provided a proof-of-concept program to tickle the bug. It requires that user space be able to do two things: arrange for nested NMIs to occur and for those NMIs return to a 16-bit stack, which is normally done for running 16-bit binaries using programs like DOSEMU. A 16-bit stack can be arranged via the modify_ldt() system call. One way to generate the NMIs required is to be run with a heavy perf load, as the proof-of-concept exploit suggests.

The Linux nested-NMI handling relies on a small section of code that needs to be run atomically. That works fine on x86_64 when using iret to return to a 64-bit stack (which effectively does the needed steps in an atomic manner), but when the NMI is returning to a segment with a 16-bit stack, iret does not restore the register state correctly. So the kernel has a workaround (called "espfix64") that tries to handle that situation by doing a complicated stack-switching dance.

That stack switching is where the problem lies. There are approximately 19 instructions where a second (i.e. nested) NMI will cause the "atomic" section to not be atomic. Furthermore, an attacker who can arrange (or luck into) landing in a two-instruction window in those instructions will be able to reliably elevate their privileges to that of root. During that window, the attacker controls the address where the return from interrupt will go. Outside of the window, a nested NMI will cause various failures and crashes, which Lutomirski's exploit will fix up while it waits for one to hit the window:

A careful exploit (attached) can recover from all the crashy failures and can regenerate a valid *privileged* state if a nested NMI occurs during the two-instruction window. This exploit appears to work reasonably quickly across a fairly wide range of Linux versions.

The espfix64 code was added in Linux 3.13, which was released over a year and a half ago in January 2014. Given that Lutomirski's proof of concept works quickly, that means there are (or, hopefully, were) a lot of systems that could be easily affected by this flaw.

The fix uses a "sneaky trick", according to Lutomirski. Instead of checking the value of the 64-bit stack pointer register (i.e. RSP) to see if it points at the NMI stack to determine if there is a nested NMI, a different test is used. As he pointed out, malicious user-space code could point RSP there, issue a system call, then cause an NMI to happen, which would fool the kernel into believing it was processing a nested NMI when it wasn't.

Lutomirski uses the fact that the "direction flag" (DF) bit in the FLAGS register is atomically reset by the iret instruction, so he sets that bit to indicate that the kernel is processing an NMI. His fix also changes the system-call entry point so that a user-space program cannot set DF while it still controls the value of RSP.

CVE-2015-3290 and the rest of the NMI-handling problems that Lutomirski has found seem a little concerning, overall. NMIs are complex beasties and their handling even more so. It would be surprising if there are not other problems lurking there. But, for now, taking Lutomirski's advice should be high on everyone's list.

Comments (5 posted)

Brief items

Security quotes of the fortnight

Google has been ordered by the [UK] Information Commissioner’s office to remove nine links to current news stories about older reports which themselves were removed from search results under the ‘right to be forgotten’ ruling.

The search engine had previously removed links relating to a 10 year-old criminal offence by an individual after requests made under the right to be forgotten ruling. Removal of those links from Google’s search results for the claimant’s name spurred new news posts detailing the removals, which were then indexed by Google’s search engine.

Google refused to remove links to these later news posts, which included details of the original criminal offence, despite them forming part of search results for the claimant’s name, arguing that they are an essential part of a recent news story and in the public interest.

The Guardian

GOP presidential candidate Donald Trump immediately called FOX News to say that the EU's actions are a crude start but adding that, "When I'm president you're going to have a really wonderful censorship system here in the USA. It's going to make those Russian and European systems look like stupid, ugly women. You're going to forget there ever were mass arrests and deportations here. I know how to do censorship. You're going to love the Trump censorship system!"

An EU spokesperson noted that upon finalization of this global RTBF [right to be forgotten] censorship order, all search and other references to articles, stories, or other materials describing this order, including this posting, would be retroactively deleted.

Lauren Weinstein

The Snake Oil Competition (SOC) is an effort organized to identify new craptographic schemes in order to improve on the state-of-the-art, and to encourage the use of snake oil cryptography. Snake Oil cryptography is widely used in practice, but recent events show that more research is urgently needed to fill much needed gaps in the field.

The winner(s) will be invited to a special edition of the Journal of Craptology (JoC). The first prize is a bottle of premium snake oil, and 100 trillion ZWR (Third Zimbabwean Dollar), equivalent to 1027 ZWD (First Zimbabwean Dollar). The loser will also be invited to the JoC.

snakeoil.cr.yp.to committee

Not just terrorists, but terrorists with a submarine! This is why Ft. Leavenworth, a prison from which no one has ever escaped, is unsuitable for housing Guantanamo detainees.

I've never understood the argument that terrorists are too dangerous to house in US prisons. They're just terrorists, it's not like they're Magneto.

Bruce Schneier reacts to a movie plot threat promulgated by a Kansas senator

TL;DR: doing RSA crypto with a public exponent value of "1" makes crypto very fast. Fast is not always good.
Kurt Seifried

Comments (none posted)

Stagefright: Mission Accomplished? (Exodus Intelligence)

It would seem that reports of the demise of the Stagefright Android vulnerability may be rather premature. Exodus Intelligence is reporting that at least one of the fixes for integer overflow did not actually fully fix the problem, so MPEG4 files can still crash Android and potentially allow code execution. "Around July 31st, Exodus Intelligence security researcher Jordan Gruskovnjak noticed that there seemed to be a severe problem with the proposed patch. As the code was not yet shipped to Android devices, we had no ability to verify this authoritatively. In the following week, hackers converged in Las Vegas for the annual Black Hat conference during which the Stagefright vulnerability received much attention, both during the talk and at the various parties and events. After the festivities concluded and the supposedly patched firmware was released to the public, Jordan proceeded to investigate whether his assumptions regarding its fallibility were well founded. They were."

Comments (37 posted)

Ruoho: Multiple Vulnerabilities in Pocket

On his blog, Clint Ruoho reports on multiple vulnerabilities he found in the Pocket service that saves articles and other web content for reading later on a variety of devices. Pocket integration has been controversially added to Firefox recently, which is what drew his attention to the service. "The full output from server-status then was synced to my Android, and was visible when I switched from web to article view. Apache’s mod_status can provide a great deal of useful information, such as internal source and destination IP address, parameters of URLs currently being requested, and query parameters. For Pocket’s app, the URLs being requested include URLs being viewed by users of the Pocket application, as some of these requests are done as HTTP GETs. These details can be omitted by disabling ExtendedStatus in Apache. Most of Pocket’s backend servers had ExtendedStatus disabled, however it remained enabled on a small subset, which would provide meaningful information to attackers." He was able to get more information, such as the contents of /etc/passwd on Pocket's Amazon EC2 servers. (Thanks to Scott Bronson and Pete Flugstad.)

Comments (30 posted)

Reports from the Linux Security Summit

The Linux Security Summit was held August 20-21 in Seattle, Washington. Unfortunately, that overlapped Linux Plumbers Conference, so LWN was unable to attend. But both James Morris and Paul Moore have nice writeups of the summit. From Morris's: "As with the previous year, we followed a two-day format, with most of the refereed presentations on the first day, with more of a developer focus on the second day. We had good attendance, and also this year had participants from a wider field than the more typical kernel security developer group. We hope to continue expanding the scope of participation next year, as it’s a good opportunity for people from different areas of security, and FOSS, to get together and learn from each other. This was the first year, for example, that we had a presentation on Incident Response, thanks to Sean Gillespie who presented on GRR, a live remote forensics tool initially developed at Google."

Comments (none posted)

New vulnerabilities

audit: unsafe escape-sequence handling

Package(s):audit CVE #(s):CVE-2015-5186
Created:August 19, 2015 Updated:August 31, 2015
Description:

From the CVE entry:

When auditing the filesystem the names of files are logged. These filenames can contain escape sequences, when viewed using the ausearch programs "-i" option for example this can result in the escape sequences being processed unsafely by the terminal program being used to view the data.

Alerts:
Fedora FEDORA-2015-13526 audit 2015-08-19
Fedora FEDORA-2015-13471 audit 2015-08-19
Mageia MGASA-2015-0333 audit 2015-08-30

Comments (none posted)

conntrack: denial of service

Package(s):conntrack CVE #(s):CVE-2015-6496
Created:August 20, 2015 Updated:January 4, 2016
Description: From the Debian advisory:

It was discovered that in certain configurations, if the relevant conntrack kernel module is not loaded, conntrackd will crash when handling DCCP, SCTP or ICMPv6 packets.

Alerts:
Fedora FEDORA-2015-1aee5e6f0b conntrack-tools 2016-01-03
Fedora FEDORA-2015-5eb2131441 conntrack-tools 2016-01-03
openSUSE openSUSE-SU-2015:1688-1 conntrack-tools 2015-10-06
Debian-LTS DLA-295-1 conntrack 2015-08-19
Debian DSA-3341-1 conntrack 2015-08-20
Mageia MGASA-2015-0363 conntrack-tools 2015-09-13

Comments (none posted)

extplorer: cross-site scripting

Package(s):extplorer CVE #(s):CVE-2015-0896
Created:August 24, 2015 Updated:May 4, 2016
Description: From the CVE entry:

Multiple cross-site scripting (XSS) vulnerabilities in eXtplorer before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Alerts:
Debian-LTS DLA-453-1 extplorer 2016-05-03
Debian-LTS DLA-296-1 extplorer 2015-08-21

Comments (none posted)

firefox: multiple vulnerabilities

Package(s):firefox CVE #(s):CVE-2015-4473 CVE-2015-4474 CVE-2015-4475 CVE-2015-4477 CVE-2015-4478 CVE-2015-4479 CVE-2015-4480 CVE-2015-4481 CVE-2015-4482 CVE-2015-4483 CVE-2015-4484 CVE-2015-4485 CVE-2015-4486 CVE-2015-4487 CVE-2015-4488 CVE-2015-4489 CVE-2015-4490 CVE-2015-4491 CVE-2015-4492 CVE-2015-4493 CVE-2015-4495
Created:August 17, 2015 Updated:December 2, 2015
Description:
     * MFSA 2015-79/CVE-2015-4473/CVE-2015-4474 Miscellaneous memory safety
       hazards
     * MFSA 2015-80/CVE-2015-4475 (bmo#1175396) Out-of-bounds read with
       malformed MP3 file
     * MFSA 2015-81/CVE-2015-4477 (bmo#1179484) Use-after-free in MediaStream
       playback
     * MFSA 2015-82/CVE-2015-4478 (bmo#1105914) Redefinition of
       non-configurable JavaScript object properties
     * MFSA 2015-83/CVE-2015-4479/CVE-2015-4480/CVE-2015-4493 Overflow issues
       in libstagefright
     * MFSA 2015-84/CVE-2015-4481 (bmo1171518) Arbitrary file overwriting
       through Mozilla Maintenance Service with hard links (only affected
       Windows)
     * MFSA 2015-85/CVE-2015-4482 (bmo#1184500) Out-of-bounds write with
       Updater and malicious MAR file (does not affect openSUSE RPM packages
       which do not ship the updater)
     * MFSA 2015-86/CVE-2015-4483 (bmo#1148732) Feed protocol with POST
       bypasses mixed content protections
     * MFSA 2015-87/CVE-2015-4484 (bmo#1171540) Crash when using shared
       memory in JavaScript
     * MFSA 2015-88/CVE-2015-4491 (bmo#1184009) Heap overflow in gdk-pixbuf
       when scaling bitmap images
     * MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 (bmo#1177948, bmo#1178148)
       Buffer overflows on Libvpx when decoding WebM video
     * MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489 Vulnerabilities
       found through code inspection
     * MFSA 2015-91/CVE-2015-4490 (bmo#1086999) Mozilla Content Security
       Policy allows for asterisk wildcards in violation of CSP specification
     * MFSA 2015-92/CVE-2015-4492 (bmo#1185820) Use-after-free in
       XMLHttpRequest with shared workers
Alerts:
Gentoo 201512-10 firefox 2015-12-30
Gentoo 201605-06 nss 2016-05-31
openSUSE openSUSE-SU-2016:0876-1 thunderbird 2016-03-24
Mageia MGASA-2016-0105 firefox 2016-03-09
Debian DSA-3410-1 icedove 2015-12-01
SUSE SUSE-SU-2015:2081-1 firefox 2015-11-23
Fedora FEDORA-2015-13436 firefox 2015-08-18
Slackware SSA:2015-226-01 firefox 2015-08-14
openSUSE openSUSE-SU-2015:1390-1 firefox 2015-08-14
Fedora FEDORA-2015-13397 firefox 2015-08-15
openSUSE openSUSE-SU-2015:1389-1 firefox 2015-08-14
CentOS CESA-2015:1682 thunderbird 2015-08-25
SUSE SUSE-SU-2015:1528-1 MozillaFirefox, mozilla-nss 2015-09-10
CentOS CESA-2015:1682 thunderbird 2015-08-25
openSUSE openSUSE-SU-2015:1454-1 thunderbird 2015-08-28
SUSE SUSE-SU-2015:1449-1 MozillaFirefox, mozilla-nss 2015-08-28
openSUSE openSUSE-SU-2015:1453-1 thunderbird 2015-08-28
CentOS CESA-2015:1682 thunderbird 2015-08-25

Comments (none posted)

golang: HTTP request smuggling

Package(s):golang CVE #(s):CVE-2015-5739 CVE-2015-5740 CVE-2015-5741
Created:August 18, 2015 Updated:July 28, 2016
Description: From the Red Hat bugzilla entry:

There have been found potentially exploitable flaws in Golang net/http library affecting versions 1.4.2 and 1.5.

Problems:
* Double Content-length headers in a request does not generate a 400 error, the second Content-length is ignored.
* Invalid headers are parsed as valid headers (like "Content Length:" with a space in the middle)
Exploitations:
In a situation where the net/http agent HTTP communication with the final http clients is using some reverse proxy (reverse proxy cache, SSL terminators, etc), some requests can be made exploiting the net/http HTTP protocol violations.

Alerts:
openSUSE openSUSE-SU-2016:1894-1 go 2016-07-27
Fedora FEDORA-2015-15618 golang 2015-10-01
Fedora FEDORA-2015-15619 golang 2015-10-01
Fedora FEDORA-2015-13002 golang 2015-08-18
Fedora FEDORA-2015-12957 golang 2015-08-18

Comments (none posted)

jasper: denial of service

Package(s):jasper CVE #(s):CVE-2015-5203
Created:August 26, 2015 Updated:September 19, 2016
Description: From the Arch Linux advisory:

A double free issue has been discovered in the function jasper_image_stop_load. This vulnerability can be triggered by loading a specially crafted image through jasper.

A remote attacker is able to send a specially crafted image that triggers a double free leading to denial of service.

Alerts:
openSUSE openSUSE-SU-2016:2737-1 jasper 2016-11-05
openSUSE openSUSE-SU-2016:2722-1 jasper 2016-11-04
Fedora FEDORA-2016-bbecf64af4 jasper 2016-09-21
Fedora FEDORA-2016-5a7e745a56 jasper 2016-09-18
Mageia MGASA-2016-0298 jasper 2016-09-16
Fedora FEDORA-2016-7776983633 jasper 2016-08-15
Arch Linux ASA-201612-9 jasper 2016-12-09
openSUSE openSUSE-SU-2016:2833-1 jasper 2016-11-17
Arch Linux ASA-201508-10 jasper 2015-08-26

Comments (none posted)

kdepim: no attachment encryption

Package(s):kdepim CVE #(s):CVE-2014-8878
Created:August 18, 2015 Updated:August 26, 2015
Description: From the Mageia advisory:

This update fixes a security vulnerability in kdepim : kmail doesn't encrypt attachments when "automatic encryption" is selected

Alerts:
Mageia MGASA-2015-0315 kdepim 2015-08-18

Comments (none posted)

libstruts1.2-java: unclear vulnerability

Package(s):libstruts1.2-java CVE #(s):CVE-2014-0899
Created:August 18, 2015 Updated:August 26, 2015
Description: From the Debian-LTS advisory:

The Validator in Apache Struts 1.1 and later contains a function to efficiently define rules for input validation across multiple pages during screen transitions. This function contains a vulnerability where input validation may be bypassed. When the Apache Struts 1 Validator is used, the web application may be vulnerable even when this function is not used explicitly.

Alerts: (No alerts in the database for this vulnerability)

Comments (none posted)

mediawiki: multiple vulnerabilities

Package(s):mediawiki CVE #(s):
Created:August 24, 2015 Updated:August 26, 2015
Description: From the Mediawiki advisory:

I would like to announce the release of MediaWiki 1.25.2, 1.24.3, and 1.23.10.

* Internal review discovered that Special:DeletedContributions did not properly protect the IP of autoblocked users. This fix makes the functionality of Special:DeletedContributions consistent with Special:Contributions and Special:BlockList.

* Internal review discovered that watchlist anti-csrf tokens were not being compared in constant time, which could allow various timing attacks. This could allow an attacker to modify a user's watchlist via csrf.

* John Menerick reported that MediaWiki's thumb.php failed to sanitize various error messages, resulting in xss.

Additionally, several extensions have been updated to fix security issues.

Alerts: (No alerts in the database for this vulnerability)

Comments (none posted)

mysql: unspecified vulnerability

Package(s):rh-mysql56-mysql CVE #(s):CVE-2015-4756
Created:August 17, 2015 Updated:August 26, 2015
Description: From the Red Hat advisory:

CVE-2015-4756 mysql: unspecified vulnerability related to Server:InnoDB

Alerts:
Gentoo 201610-06 mysql 2016-10-11
openSUSE openSUSE-SU-2015:1629-1 mysql-community-server 2015-09-25
Red Hat RHSA-2015:1646-01 rh-mariadb100-mariadb 2015-08-20
Red Hat RHSA-2015:1630-01 rh-mysql56-mysql 2015-08-17

Comments (none posted)

nagios-plugins: three vulnerabilities

Package(s):nagios-plugins CVE #(s):CVE-2014-4702 CVE-2014-4701 CVE-2014-4703
Created:August 18, 2015 Updated:August 26, 2015
Description: From a Red Hat bugzilla entry:

CVE-2014-4702: Similar to the CVE-2014-4701 issue in the check_dhcp plug-in, the same flaw was found to affect check_icmp. A local attacker could obtain sensitive information by using this flaw to read parts of INI configuration files that belong to the root user.

From another Red Hat bugzilla entry:

CVE-2014-4701, CVE-2014-4703: It was reported that check_dhcp plugin allow local unprivileged user to read parts of INI config files belonging to root on a local system. It could allow an attacker to obtain sensitive information like passwords that should only be accessible by root user. The vulnerability is due to check_dhcp plugin having Root SUID permissions and inappropriate access control when reading user provided config file (through --extra-opts= option).

Alerts:
Fedora FEDORA-2015-12987 nagios-plugins 2015-08-18
Fedora FEDORA-2015-12972 nagios-plugins 2015-08-18

Comments (none posted)

net-snmp: code execution

Package(s):net-snmp CVE #(s):CVE-2015-5621
Created:August 18, 2015 Updated:September 8, 2015
Description: From the Red Hat advisory:

It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd. (CVE-2015-5621)

Alerts:
Ubuntu USN-2711-1 net-snmp 2015-08-17
Scientific Linux SLSA-2015:1636-1 net-snmp 2015-08-17
Oracle ELSA-2015-1636 net-snmp 2015-08-17
Oracle ELSA-2015-1636 net-snmp 2015-08-17
Mandriva MDVSA-2015:229 net-snmp 2015-05-06
Mageia MGASA-2015-0187 net-snmp 2015-05-05
CentOS CESA-2015:1636 net-snmp 2015-08-17
CentOS CESA-2015:1636 net-snmp 2015-08-17
Red Hat RHSA-2015:1636-01 net-snmp 2015-08-17
openSUSE openSUSE-SU-2015:1502-1 net-snmp 2015-09-07

Comments (none posted)

openshift: privilege escalation

Package(s):openshift CVE #(s):CVE-2015-5222
Created:August 21, 2015 Updated:August 26, 2015
Description: From the Red Hat advisory:

An improper permission check issue was discovered in the server admission control component in OpenShift. A user with build permissions could use this flaw to execute arbitrary shell commands on a build pod with the privileges of the root user.

Alerts:
Red Hat RHSA-2015:1650-01 openshift 2015-08-20

Comments (none posted)

openssh: multiple vulnerabilities

Package(s):openssh CVE #(s):CVE-2015-6565 CVE-2015-6563 CVE-2015-6564
Created:August 19, 2015 Updated:August 26, 2015
Description:

From the OpenSSH release notes:

sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world- writable. Local attackers may be able to write arbitrary messages to logged-in users, including terminal escape sequences. Reported by Nikolay Edigaryev. (CVE-2015-6565)

sshd(8): Portable OpenSSH only: Fixed a privilege separation weakness related to PAM support. Attackers who could successfully compromise the pre-authentication process for remote code execution and who had valid credentials on the host could impersonate other users. Reported by Moritz Jodeit. (CVE-2015-6563)

sshd(8): Portable OpenSSH only: Fixed a use-after-free bug related to PAM support that was reachable by attackers who could compromise the pre-authentication process for remote code execution. Also reported by Moritz Jodeit. (CVE-2015-6564)

Alerts:
Scientific Linux SLSA-2015:2088-6 openssh 2015-12-21
Scientific Linux SLSA-2016:0741-1 openssh 2016-06-08
Red Hat RHSA-2016:0741-01 openssh 2016-05-10
Gentoo 201512-04 openssh 2015-12-21
Red Hat RHSA-2015:2088-06 openssh 2015-11-19
SUSE SUSE-SU-2015:1581-1 openssh 2015-09-21
Mageia MGASA-2015-0321 openssh 2015-08-21
Fedora FEDORA-2015-13520 openssh 2015-08-19
Fedora FEDORA-2015-13469 openssh 2015-08-27

Comments (none posted)

openstack-neutron: denial of service

Package(s):openstack-neutron CVE #(s):CVE-2015-3221
Created:August 25, 2015 Updated:August 26, 2015
Description: From the Red Hat advisory:

A Denial of Service flaw was found in the L2 agent when using the IPTables firewall driver. By submitting an address pair that will be rejected as invalid by the ipset tool, an attacker may cause the agent to crash.

Alerts:
Red Hat RHSA-2015:1680-01 openstack-neutron 2015-08-24

Comments (none posted)

owncloud: three vulnerabilities

Package(s):owncloud CVE #(s):CVE-2015-4715 CVE-2015-4717 CVE-2015-4718
Created:August 14, 2015 Updated:August 26, 2015
Description: From the Mageia advisory:

In ownCloud before 6.0.8 and 8.0.4, a bug in the SDK used to connect ownCloud against the Dropbox server might allow the owner of "Dropbox.com" to gain access to any files on the ownCloud server if an external Dropbox storage was mounted (CVE-2015-4715).

In ownCloud before 6.0.8 and 8.0.4, the sanitization component for filenames was vulnerable to DoS when parsing specially crafted file names passed via specific endpoints. Effectively this lead to a endless loop filling the log file until the system is not anymore responsive (CVE-2015-4717).

In ownCloud before 6.0.8 and 8.0.4, the external SMB storage of ownCloud was not properly neutralizing all special elements which allows an adversary to execute arbitrary SMB commands. This was caused by improperly sanitizing the ";" character which is interpreted as command separator by smbclient (the used software to connect to SMB shared by ownCloud). Effectively this allows an attacker to gain access to any file on the system or overwrite it, finally leading to a PHP code execution in the case of ownCloud’s config file (CVE-2015-4718).

Alerts:
Debian DSA-3373-1 owncloud 2015-10-18
Mageia MGASA-2015-0314 owncloud 2015-08-13

Comments (none posted)

pcre: code execution

Package(s):pcre CVE #(s):CVE-2015-8381
Created:August 14, 2015 Updated:December 2, 2015
Description: From the Red Hat bugzilla entry:

Latest version of PCRE is prone to a Heap Overflow vulnerability which could caused by the following regular expression.

    /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/
Alerts:
Red Hat RHSA-2016:2750-01 rh-php56 2016-11-15
Gentoo 201607-02 libpcre 2016-07-09
Red Hat RHSA-2016:1132-01 rh-mariadb100-mariadb 2016-05-26
openSUSE openSUSE-SU-2016:3099-1 pcre 2016-12-12
Ubuntu USN-2943-1 pcre3 2016-03-29
Arch Linux ASA-201508-11 pcre 2015-08-26
Fedora FEDORA-2015-12921 pcre 2015-08-13
Mageia MGASA-2015-0343 pcre 2015-09-08
Fedora FEDORA-2015-14242 pcre 2015-09-11
Fedora FEDORA-2015-14235 pcre 2015-09-11

Comments (none posted)

php: multiple vulnerabilities

Package(s):php CVE #(s):
Created:August 24, 2015 Updated:August 26, 2015
Description: The php package has been updated to version 5.6.12, fixing several bugs and security issues. See the upstream Changelog for more details.

Also 5.5.28 has been released: upstream changelog.

Alerts: (No alerts in the database for this vulnerability)

Comments (none posted)

python-django: multiple vulnerabilities

Package(s):python-django CVE #(s):CVE-2015-5963 CVE-2015-5964
Created:August 19, 2015 Updated:October 16, 2015
Description:

From the Debian advisory:

Lin Hua Cheng discovered that a session could be created when anonymously accessing the django.contrib.auth.views.logout view. This could allow remote attackers to saturate the session store or cause other users' session records to be evicted.

Additionally the contrib.sessions.backends.base.SessionBase.flush() and cache_db.SessionStore.flush() methods have been modified to avoid creating a new empty session as well.

Alerts:
Fedora FEDORA-2015-1dd5bc998f python-django 2015-11-19
Red Hat RHSA-2015:1894-01 python-django 2015-10-15
Red Hat RHSA-2015:1876-01 python-django 2015-10-08
openSUSE openSUSE-SU-2015:1598-1 python-django 2015-09-22
openSUSE openSUSE-SU-2015:1580-1 python-Django 2015-09-19
Mageia MGASA-2015-0327 python-django, python-django14 2015-08-27
Arch Linux ASA-201508-9 python-django 2015-08-25
Ubuntu USN-2720-1 python-django 2015-08-18
Debian DSA-3338-1 python-django 2015-08-18
Red Hat RHSA-2015:1766-01 python-django 2015-09-10
Debian-LTS DLA-301-1 python-django 2015-08-26
Red Hat RHSA-2015:1767-01 python-django 2015-09-10

Comments (none posted)

python-django-horizon: cross-site scripting

Package(s):python-django-horizon CVE #(s):CVE-2015-3219 CVE-2015-3988
Created:August 25, 2015 Updated:August 26, 2015
Description: From the CVE entries:

Cross-site scripting (XSS) vulnerability in the Orchestration/Stack section in OpenStack Dashboard (Horizon) 2014.2 before 2014.2.4 and 2015.1.x before 2015.1.1 allows remote attackers to inject arbitrary web script or HTML via the description parameter in a heat template, which is not properly handled in the help_text attribute in the Field class. (CVE-2015-3219)

Multiple cross-site scripting (XSS) vulnerabilities in OpenStack Dashboard (Horizon) 2015.1.0 allow remote authenticated users to inject arbitrary web script or HTML via the metadata to a (1) Glance image, (2) Nova flavor or (3) Host Aggregate. (CVE-2015-3988)

Alerts:
Debian DSA-3617-1 horizon 2016-07-06
Red Hat RHSA-2015:1679-01 python-django-horizon 2015-08-24

Comments (none posted)

qemu: two vulnerabilities

Package(s):qemu CVE #(s):CVE-2015-5166 CVE-2015-5165
Created:August 18, 2015 Updated:September 28, 2015
Description: From a Red Hat bugzilla entry:

CVE-2015-5165: Qemu emulator built with the RTL8139 emulation support is vulnerable to an information leakage flaw. It could occur while processing network packets under RTL8139 controller's C+ mode of operation.

A guest user could use this flaw to read uninitialised Qemu heap memory upto 65K bytes.

From another Red Hat bugzilla entry:

CVE-2015-5166: Qemu emulator built with the IDE Emulation PCI PIIX3/4 support is vulnerable to a use-after-free flaw. It could occur when trying to write data to an I/O port inside guest. This issue is specific to the Xen platform.

A privileged(CAP_SYS_RAWIO) guest user on the Xen platform could use this flaw to crash the Qemu instance or probably attempt to make a guest escape.

Alerts:
Oracle ELSA-2016-0997 qemu-kvm 2016-05-17
Debian-LTS DLA-479-1 xen 2016-05-18
Mageia MGASA-2016-0098 xen 2016-03-07
openSUSE openSUSE-SU-2015:2003-1 xen 2015-11-17
openSUSE openSUSE-SU-2015:1964-1 xen 2015-11-12
SUSE SUSE-SU-2015:1643-1 Xen 2015-09-25
Fedora FEDORA-2015-15946 xen 2015-09-26
Fedora FEDORA-2015-15944 xen 2015-09-27
Scientific Linux SLSA-2015:1833-1 qemu-kvm 2015-09-22
Oracle ELSA-2015-1833 qemu-kvm 2015-09-22
CentOS CESA-2015:1833 qemu-kvm 2015-09-22
Red Hat RHSA-2015:1833-01 qemu-kvm 2015-09-22
Scientific Linux SLSA-2015:1793-1 qemu-kvm 2015-09-15
Oracle ELSA-2015-1793 qemu-kvm 2015-09-15
Red Hat RHSA-2015:1793-01 qemu-kvm 2015-09-15
Mageia MGASA-2015-0368 qemu 2015-09-15
Ubuntu USN-2724-1 qemu, qemu-kvm 2015-08-27
Red Hat RHSA-2015:1683-01 qemu-kvm-rhev 2015-08-25
Red Hat RHSA-2015:1674-01 qemu-kvm-rhev 2015-08-24
SUSE SUSE-SU-2015:1421-1 xen 2015-08-21
Fedora FEDORA-2015-13402 qemu 2015-08-18
Debian DSA-3349-1 qemu-kvm 2015-09-02
Debian DSA-3348-1 qemu 2015-09-02
Mageia MGASA-2015-0369 qemu 2015-09-15
Red Hat RHSA-2015:1718-01 qemu-kvm-rhev 2015-09-03
SUSE SUSE-SU-2015:1479-2 xen 2015-09-02
SUSE SUSE-SU-2015:1479-1 xen 2015-09-02
Fedora FEDORA-2015-13404 qemu 2015-09-01

Comments (none posted)

request-tracker4: cross-site scripting

Package(s):request-tracker4 CVE #(s):CVE-2015-5475
Created:August 13, 2015 Updated:August 26, 2015
Description: From the Debian advisory:

It was discovered that Request Tracker, an extensible trouble-ticket tracking system is susceptible to a cross-site scripting attack via the user [and] group rights management pages (CVE-2015-5475) and via the cryptography interface, allowing an attacker with a carefully-crafted key to inject JavaScript into RT's user interface. Installations which use neither GnuPG nor S/MIME are unaffected by the second cross-site scripting vulnerability.

Alerts:
Debian DSA-3335-1 request-tracker4 2015-08-13
Fedora FEDORA-2015-13664 rt 2015-08-27
Fedora FEDORA-2015-13718 rt 2015-08-27

Comments (none posted)

roundup: multiple vulnerabilities

Package(s):roundup CVE #(s):CVE-2012-6130 CVE-2012-6131 CVE-2012-6132 CVE-2012-6133
Created:August 24, 2015 Updated:August 26, 2015
Description: From the CVE entries:

Cross-site scripting (XSS) vulnerability in the history display in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via a username, related to generating a link. (CVE-2012-6130)

Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1. (CVE-2012-6131)

Cross-site scripting (XSS) vulnerability in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the otk parameter. (CVE-2012-6132)

From the Debian LTS advisory:

XSS flaws in ok and error messages
We solve this differently from the proposals in the bug-report by not allowing *any* html-tags in ok/error messages anymore. (CVE-2012-6133)

Alerts:
Debian-LTS DLA-298-1 roundup 2015-08-23

Comments (none posted)

ruby: information disclosure

Package(s):ruby1.8 CVE #(s):CVE-2009-5147
Created:August 26, 2015 Updated:December 17, 2015
Description: From the Debian LTS advisory:

"sheepman" fixed a vulnerability in Ruby 1.8: DL::dlopen could open a library with tainted name even if $SAFE > 0.

Alerts:
Fedora FEDORA-2015-c4409eb73a ruby 2016-01-08
Fedora FEDORA-2015-eef21b972e ruby 2015-12-29
Arch Linux ASA-201512-11 ruby 2015-12-17
Debian-LTS DLA-300-1 ruby1.9.1 2015-08-26
Debian-LTS DLA-299-1 ruby1.8 2015-08-26

Comments (none posted)

strongswan: incorrect payload processing

Package(s):strongswan CVE #(s):CVE-2015-3991
Created:August 19, 2015 Updated:August 26, 2015
Description:

From the Fedora advisory:

Incorrect payload processing for different IKE versions.

Alerts:
Fedora FEDORA-2015-5279 strongswan 2015-08-19
Fedora FEDORA-2015-5247 strongswan 2015-08-19

Comments (none posted)

twig: code execution

Package(s):twig CVE #(s):
Created:August 26, 2015 Updated:August 26, 2015
Description: From the Debian advisory:

James Kettle, Alain Tiemblo, Christophe Coevoet and Fabien Potencier discovered that twig, a templating engine for PHP, did not correctly process its input. End users allowed to submit twig templates could use specially crafted code to trigger remote code execution, even in sandboxed templates.

Alerts:
Debian DSA-3343-1 twig 2015-08-26

Comments (none posted)

uwsgi: denial of service

Package(s):uwsgi CVE #(s):
Created:August 18, 2015 Updated:August 26, 2015
Description: From the uwsgi announcement:

Hi, an emergency release fixing an HTTPS resource leak (spotted by André Cruz) is available

http://uwsgi-docs.readthedocs.org/en/latest/Changelog-2.0.11.1.html

If you use the uWSGI https router you should upgrade to avoid excessive file descriptors and memory allocation.

Alerts:
Fedora FEDORA-2015-12032 uwsgi 2015-08-18
Fedora FEDORA-2015-12020 uwsgi 2015-08-18

Comments (none posted)

virtualbox: unspecified vulnerability

Package(s):virtualbox CVE #(s):CVE-2015-2594
Created:August 18, 2015 Updated:September 14, 2015
Description: From the SUSE bug tracker:

Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.0.32, 4.1.40, 4.2.32, and 4.3.30 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core.

Alerts:
Debian-LTS DLA-313-1 virtualbox-ose 2015-09-29
openSUSE openSUSE-SU-2015:1400-1 virtualbox 2015-08-18
Debian DSA-3359-1 virtualbox 2015-09-13

Comments (none posted)

vlc: code execution

Package(s):vlc CVE #(s):CVE-2015-5949
Created:August 20, 2015 Updated:February 17, 2016
Description: From the Debian advisory:

Loren Maggiore of Trail of Bits discovered that the 3GP parser of VLC, a multimedia player and streamer, could dereference an arbitrary pointer due to insufficient restrictions on a writable buffer. This could allow remote attackers to execute arbitrary code via crafted 3GP files.

Alerts:
Gentoo 201603-08 vlc 2016-03-12
openSUSE openSUSE-SU-2016:0476-1 vlc 2016-02-16
Debian DSA-3342-1 vlc 2015-08-20
Mageia MGASA-2015-0324 vlc 2015-08-25
Mageia MGASA-2015-0329 vlc 2015-08-27

Comments (none posted)

webkitgtk4: three unspecified vulnerabilities

Package(s):webkitgtk4 CVE #(s):
Created:August 18, 2015 Updated:August 26, 2015
Description: From the Fedora advisory:

WebKitGTK+ 2.8.5 includes fixes for 3 security issues.

Alerts:
Fedora FEDORA-2015-13001 webkitgtk4 2015-08-18

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):
Created:August 24, 2015 Updated:August 26, 2015
Description: From the openSUSE advisory:

Wireshark was updated to fix several security vulnerabilities and bugs.

- Wireshark 1.12.7 [boo#941500] The following vulnerabilities have been fixed:

* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21

* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22

* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23

* The ZigBee dissector could crash. wnpa-sec-2015-24

* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25

* The WaveAgent dissector could crash. wnpa-sec-2015-26

* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27

* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28

* The WCCP dissector could crash. wnpa-sec-2015-29

* Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7....

Alerts: (No alerts in the database for this vulnerability)

Comments (none posted)

zendframework: XML external entity attack

Package(s):zendframework CVE #(s):CVE-2015-5161
Created:August 20, 2015 Updated:September 15, 2015
Description: From the Debian advisory:

Dawid Golunski discovered that when running under PHP-FPM in a threaded environment, Zend Framework, a PHP framework, did not properly handle XML data in multibyte encoding. This could be used by remote attackers to perform an XML External Entity attack via crafted XML data.

Alerts:
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
Debian-LTS DLA-499-1 php5 2016-05-31
Fedora FEDORA-2015-f1e18131bc php-ZendFramework 2015-11-09
Fedora FEDORA-2015-6d70a701bf php-ZendFramework 2015-11-09
Fedora FEDORA-2015-2e7c06c639 php-ZendFramework 2015-11-08
Debian DSA-3340-1 zendframework 2015-08-19
Fedora FEDORA-2015-13488 php-guzzle-Guzzle 2015-08-27
Fedora FEDORA-2015-13488 php-ZendFramework2 2015-08-27
Fedora FEDORA-2015-13529 php-guzzle-Guzzle 2015-08-27
Mageia MGASA-2015-0370 php-ZendFramework 2015-09-15
Mageia MGASA-2015-0371 php-ZendFramework 2015-09-15
Fedora FEDORA-2015-13529 php-ZendFramework2 2015-08-27
Debian-LTS DLA-302-1 zendframework 2015-08-27

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2015, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds