|
|
Log in / Subscribe / Register

Security

Increasing the range of address-space layout randomization

By Jonathan Corbet
December 16, 2015
Many attempts to exploit vulnerabilities in computing systems depend on the ability to locate a specific data structure or piece of code in a running process. Attempts that proceed with an incorrect address will typically fail or, even better, cause a crash that brings attention to the exploit attempt. For this reason, most contemporary systems try to obscure the layout of running processes. To a great extent this effort relies on not leaking information from those processes, or from the kernel, but it is also important to avoid letting those locations be predictable in the first place. The mechanisms used in Linux toward this end are seen by many as woefully inadequate; a current patch set is unlikely to change that impression greatly, but it might just succeed in increasing security on some systems.

Address space layout randomization (ASLR) introduces some randomness into the locations where a process's code and data segments are placed within that process's address space. Two processes running the same program should, under ASLR, see that program placed in different virtual locations. The Linux kernel first implemented ASLR back in 2005. Even then, that implementation was seen as being, at best, a partial solution to the problem.

ASLR works by calculating a random offset to be added to the return value from every mmap() call. Since mmap() is used to place most data and code segments, that causes this offset to apply to most of the process's address space (one exception is the stack, which has a separate offset). On 32-bit systems, the offset is an eight-bit value; the offset is interpreted in pages, so, on these systems, memory areas from mmap() will have a random offset between zero and 255 pages. Note that the lowest bits of the address of any mapping are not random, since mappings are page-aligned.

This offset will be sufficient to frustrate (almost all the time) a simple exploit that tries a single, hard-coded address. It is somewhat less effective, though, if the exploit is able to retry with varying offsets of its own. Only 256 attempts are required to explore the entire range of potential offsets; an exploit running locally can probably work through the entire set in well less than a second, especially if it is able to avoid causing process crashes in its attempts. ASLR, thus, does not provide a great deal of additional security against such threats.

The problem is that there is only so much address space to play with, especially on 32-bit systems. Shifting the heap and stack areas around will reduce the space between them (traditional layout schemes having been designed to maximize that space); that, in turn, can cause programs needing to do huge allocations to fail. Increasing the amount of randomness in the layout offset may not cause problems in a lot of systems, but a mechanism that goes into everybody's kernel has to be implemented conservatively. Thus, the eight-bit value used on 32-bit systems (64-bit systems have more space to play with, so a 28-bit offset is used on x86-64, for example).

One might think that 32-bit systems are on the way out, but there are still a lot of them — including a lot of Android devices. When the "Stagefright" vulnerability, which affects Android systems, was disclosed in July, Mark Brand at Google set out to write an exploit for it. He duly found that ASLR was not a significant obstacle in the face of a brute-force attack; as he put it: "I knew that ASLR on 32-bit was always a bit shaky; but I didn’t think it was this broken." An easily exploitable vulnerability on vast numbers of Android devices is a bit of a nightmare scenario; it would be nice if the kernel had ways to mitigate exploits in such situations. ASLR, as it turns out, is, in its current form, not really one of those ways.

The interesting thing about Android, though, is that it is a relatively controlled environment. It may not always need the same level of generality that a kernel-for-everybody must provide. If it is known that Android systems will not be making huge allocations (and that should be fairly well known), then it may well be safe to increase the randomness of the ASLR mechanism, making brute-force attacks harder to carry out. But current kernels offer no way to increase the amount of randomness used with ASLR.

It would not be out of character for the Android developers to simply patch a higher degree of randomness into the kernel shipped with the Android distribution. But, sometimes, they try to get a general solution into the upstream kernel instead. That is what is happening with Daniel Cashman's patch to provide an customizable random offset range for ASLR.

This patch set replaces the compile-time ASLR offset range with a pair of new sysctl knobs called /proc/sys/vm/mmap_rnd_bits and /proc/sys/vm/mmap_rnd_compat_bits. The first covers normal processes, while the second applies to those running in the compatibility mode — 32-bit processes running on a 64-bit kernel, for example. The default value matches the value in current kernels, so users will see no change unless they (or their distributor) explicitly make a change.

As the names suggest, these knobs control the number of address-space bits used for the ASLR random offset. Each architecture sets minimum and maximum values that make sense, given the available address space. On x86, the value may range between eight and 16 bits (for 32-bit) or 28 and 32 (for 64-bit). The limits for ARM are rather more complicated, depending on the specific subarchitecture and the page size in use. In all cases, though, this patch makes it possible to increase the number of bits used for the random offset. Each additional bit doubles the space that must be searched, making an exploit slower and more likely to be detected. If the Android developers are able to use this feature to increase ASLR randomness, the next Stagefright-like vulnerability will, hopefully, be harder to exploit.

This patch set has been through a number of revisions (six thus far with at least one more expected) based on comments. Those comments, though, are concerned with how the patch can be improved; there does not seem to be any real discomfort with the idea in general. So Linux kernels could offer more random address-space layout randomization in the relatively near future.

Comments (16 posted)

Brief items

Security quotes of the week

They know that the smart, major terrorist groups will never use systems with government-mandated backdoors for their important communications, they'll continue to use strong systems developed in and/or distributed by countries without such government mandates, or their own strong self-designed apps.

So it seems clear that the real reason for the government push for encryption backdoors is an attempt not to catch the most dangerous terrorists that they're constantly talking about, but rather a selection of "low-hanging fruit" of various sorts.

Inept would-be low-level terrorists. Drug dealers. Prostitution rings. Free speech advocates and other political dissidents. You know the types.

That is, just about everybody EXCEPT the most dangerous terrorist groups that wouldn't go near backdoored encryption systems with a ten foot pole, yet are the very groups governments are loudly claiming backdoor systems are required to fight.

Lauren Weinstein

Although the new policy is primarily tailored towards worried parents, adults who become victims of online abuse will also be covered. The policy money can be used to pay a reputation management team that would restore the person's public image, or even to hire a forensic specialist to trace the origins of the trolling.

Chubb's clients will be able to sign up for troll insurance with a policy renewal starting from January 1, 2016.

Andrii Degeler in Ars Technica on a new type of insurance

Comments (7 posted)

An authentication bypass issue in GRUB

The GRUB bootloader (versions 1.98 to 2.02) has an integer underflow issue which can enable a local attacker to bypass authentication on a locked-down system. "Grub2 is the bootloader used by most Linux systems including some embedded systems. This results in an incalculable number of affected devices."

Comments (12 posted)

New vulnerabilities

arts: privilege escalation

Package(s):arts kdelibs CVE #(s):CVE-2015-7543
Created:December 10, 2015 Updated:December 31, 2015
Description: From the Debian-LTS advisory:

It has been reported that arts uses the insecure mktemp() function to create the temporary directory it uses to host user-specific sockets. It is thus possible for another user to hijack this temporary directory and gain IPC access it should not have.

Alerts:
Fedora FEDORA-2015-8dd01b09a9 arts 2015-12-30
Fedora FEDORA-2015-6e50918d8e kdelibs3 2015-12-29
Debian-LTS DLA-367-1 kdelibs 2015-12-10
Fedora FEDORA-2015-6d473c95ee arts 2015-12-29
Debian-LTS DLA-366-1 arts 2015-12-10

Comments (none posted)

bind: socket error

Package(s):bind CVE #(s):CVE-2015-8461
Created:December 16, 2015 Updated:December 16, 2015
Description: From the Slackware advisory:

Address fetch context reference count handling error on socket error.

Alerts:
Fedora FEDORA-2015-2df40de264 dnsperf 2015-12-22
Fedora FEDORA-2015-2df40de264 bind-dyndb-ldap 2015-12-22
Fedora FEDORA-2015-2df40de264 bind 2015-12-22
Fedora FEDORA-2015-09bf9e06ea dnsperf 2015-12-19
Fedora FEDORA-2015-09bf9e06ea bind-dyndb-ldap 2015-12-19
Fedora FEDORA-2015-09bf9e06ea bind 2015-12-19
Slackware SSA:2015-349-01 bind 2015-12-15

Comments (none posted)

bind: denial of service

Package(s):bind CVE #(s):CVE-2015-8000
Created:December 16, 2015 Updated:December 29, 2015
Description: From the Arch Linux advisory:

An error in the parsing of incoming responses allows some records with an incorrect class to be accepted by BIND instead of being rejected as malformed. This can trigger a REQUIRE assertion failure when those records are subsequently cached. Intentional exploitation of this condition is possible and could be used as a denial-of-service vector against servers performing recursive queries.

An attacker who can cause a server to request a record with a malformed class attribute can use this bug to trigger a REQUIRE assertion in db.c, causing named to exit and denying service to clients. The risk to recursive servers is high. Authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs.

Alerts:
Oracle ELSA-2016-2094 bind97 2016-10-21
Oracle ELSA-2016-2093 bind 2016-10-21
Red Hat RHSA-2016:0079-01 bind 2016-01-28
Red Hat RHSA-2016:0078-01 bind 2016-01-28
SUSE SUSE-SU-2016:0227-1 bind 2016-01-25
openSUSE openSUSE-SU-2015:2391-1 bind 2015-12-29
Fedora FEDORA-2015-e278e12ebc dhcp 2015-12-28
Fedora FEDORA-2015-e278e12ebc bind99 2015-12-28
SUSE SUSE-SU-2015:2359-1 bind 2015-12-25
openSUSE openSUSE-SU-2015:2365-1 bind 2015-12-25
openSUSE openSUSE-SU-2015:2364-1 bind 2015-12-25
SUSE SUSE-SU-2015:2340-1 bind 2015-12-22
SUSE SUSE-SU-2015:2341-1 bind 2015-12-22
Fedora FEDORA-2015-2df40de264 dnsperf 2015-12-22
Fedora FEDORA-2015-2df40de264 bind-dyndb-ldap 2015-12-22
Fedora FEDORA-2015-2df40de264 bind 2015-12-22
Mageia MGASA-2015-0481 bind 2015-12-20
Fedora FEDORA-2015-09bf9e06ea dnsperf 2015-12-19
Fedora FEDORA-2015-40882ddfb1 dhcp 2015-12-19
Fedora FEDORA-2015-40882ddfb1 bind99 2015-12-19
Fedora FEDORA-2015-09bf9e06ea bind-dyndb-ldap 2015-12-19
Fedora FEDORA-2015-09bf9e06ea bind 2015-12-19
Scientific Linux SLSA-2015:2655-1 bind 2015-12-17
Scientific Linux SLSA-2015:2658-1 bind97 2015-12-16
Scientific Linux SLSA-2015:2656-1 bind 2015-12-16
Oracle ELSA-2015-2658 bind97 2015-12-16
Oracle ELSA-2015-2656 bind 2015-12-16
Oracle ELSA-2015-2655 bind 2015-12-16
Oracle ELSA-2015-2655 bind 2015-12-16
Debian-LTS DLA-370-1 bind9 2015-12-17
CentOS CESA-2015:2658 bind97 2015-12-16
CentOS CESA-2015:2656 bind 2015-12-16
CentOS CESA-2015:2655 bind 2015-12-16
CentOS CESA-2015:2655 bind 2015-12-16
Red Hat RHSA-2015:2658-01 bind97 2015-12-16
Red Hat RHSA-2015:2656-01 bind 2015-12-16
Red Hat RHSA-2015:2655-01 bind 2015-12-16
Ubuntu USN-2837-1 bind9 2015-12-15
Slackware SSA:2015-349-01 bind 2015-12-15
Debian DSA-3420-1 bind9 2015-12-15
Arch Linux ASA-201512-10 bind 2015-12-16

Comments (none posted)

cups-filters: command execution

Package(s):cups-filters CVE #(s):CVE-2015-8560
Created:December 16, 2015 Updated:December 31, 2015
Description: From the Debian advisory:

Adam Chester discovered that missing input sanitising in the foomatic-rip print filter might result in the execution of arbitrary commands.

Alerts:
Fedora FEDORA-2015-998911cf3f cups-filters 2015-12-30
openSUSE openSUSE-SU-2015:2367-1 cups-filters 2015-12-27
CentOS CESA-2016:0491 foomatic 2016-03-23
Scientific Linux SLSA-2016:0491-1 foomatic 2016-03-23
Oracle ELSA-2016-0491 foomatic 2016-03-22
Red Hat RHSA-2016:0491-01 foomatic 2016-03-22
Debian DSA-3429-1 foomatic-filters 2015-12-21
Fedora FEDORA-2015-a108c34086 cups-filters 2015-12-19
Debian-LTS DLA-371-1 foomatic-filters 2015-12-18
Mageia MGASA-2015-0476 cups-filters 2015-12-16
Ubuntu USN-2838-2 foomatic-filters 2015-12-16
Ubuntu USN-2838-1 cups-filters 2015-12-16
Debian DSA-3419-1 cups-filters 2015-12-15

Comments (none posted)

grub2: code execution

Package(s):grub2 CVE #(s):CVE-2015-8370
Created:December 14, 2015 Updated:January 7, 2016
Description: From the Red Hat bugzilla:

A buffer overflow flaw was found in the way grub2 checked the password entered by the user during bootup. A local attacker could use this flaw to circumvent the password check and, potentially, execute arbitrary code on the system.

See the original report for lots of details on this vulnerability.

Alerts:
openSUSE openSUSE-SU-2016:0036-1 grub2 2016-01-06
SUSE SUSE-SU-2015:2399-1 grub2 2015-12-30
SUSE SUSE-SU-2015:2386-1 grub2 2015-12-29
SUSE SUSE-SU-2015:2385-1 grub2 2015-12-29
SUSE SUSE-SU-2015:2387-1 grub2 2015-12-29
openSUSE openSUSE-SU-2015:2392-1 grub2 2015-12-29
openSUSE openSUSE-SU-2015:2375-1 grub2 2015-12-27
Scientific Linux SLSA-2015:2623-1 grub2 2015-12-21
Mageia MGASA-2015-0480 grub2 2015-12-20
Gentoo 201512-03 grub 2015-12-19
Slackware SSA:2015-351-01 grub 2015-12-17
Fedora FEDORA-2015-90c27b6e91 grub2 2015-12-17
Debian DSA-3421-1 grub2 2015-12-16
Ubuntu USN-2836-1 grub2 2015-12-15
Oracle ELSA-2015-2623 grub2 2015-12-15
CentOS CESA-2015:2653 grub2 2015-12-16
Red Hat RHSA-2015:2623-01 grub2 2015-12-15
Fedora FEDORA-2015-cebe5133e7 grub2 2015-12-13
Debian-LTS DLA-368-1 grub2 2015-12-12

Comments (none posted)

kdelibs: privilege escalation

Package(s):kdelibs CVE #(s):CVE-2015-7543
Created:December 10, 2015 Updated:December 31, 2015
Description: From the Debian-LTS advisory:

It has been reported that kdelibs uses the insecure mktemp() function to create the temporary directory it uses to host user-specific sockets. It is thus possible for another user to hijack this temporary directory and gain socket accesses it should not have.

Alerts:
Fedora FEDORA-2015-2f4b92ed2e kdelibs3 2015-12-30

Comments (none posted)

keepassx: information disclosure

Package(s):keepassx CVE #(s):CVE-2015-8378
Created:December 11, 2015 Updated:December 24, 2015
Description:

From the Arch Linux advisory:

It was found that XML export function creates hidden XML file containing user passwords in plaintext without warning, when the export is canceled, which may go unnoticed by the user.

In this case the password database was exported as the file “.xml” in the current working directory (often $HOME or the directory of the database) and is world readable.

Alerts:
Mageia MGASA-2015-0483 keepassx 2015-12-24
Arch Linux ASA-201512-8 keepassx 2015-12-10

Comments (none posted)

kernel: two vulnerabilities

Package(s):kernel CVE #(s):CVE-2015-7515 CVE-2015-8374
Created:December 16, 2015 Updated:December 16, 2015
Description: From the Red Hat bugzilla:

CVE-2015-7515: An out-of-bounds memory access flaw was found in aiptek USB tablet driver in aiptek_probe() function in drivers/input/tablet/aiptek.c. The driver assumes that the interface always has at least one endpoint. By using a specially crafted USB device with no endpoints on one of its interfaces an unprivileged user with a physical access to the system can trigger a kernel NULL pointer dereference causing the system to panic.

CVE-2015-8374: An information leak vulnerability was found when truncating a file to a smaller size which consists of an inline extent that is compressed. The data between the new file size and the old file size were not discarded, wasting metadata space and allowing for the truncated data to be leaked and the data corruption/loss to occur. The number of bytes used by the inode were not correctly decremented, which gives wrong report for callers of the stat(2) syscall. It is possible for a caller of the clone ioctl to actually read the data that was truncated, allowing for a security breach without requiring root access to the system, using only standard filesystem operations.

Note that this is a Btrfs vulnerability; see this commit for details.

Alerts:
Red Hat RHSA-2016:2584-02 kernel-rt 2016-11-03
Red Hat RHSA-2016:2574-02 kernel 2016-11-03
openSUSE openSUSE-SU-2016:2649-1 kernel 2016-10-26
Oracle ELSA-2016-3618 kernel 2016-09-22
Oracle ELSA-2016-3618 kernel 2016-09-22
Oracle ELSA-2016-3617 kernel 2016-09-22
Oracle ELSA-2016-3617 kernel 2016-09-22
SUSE SUSE-SU-2016:2074-1 kernel 2016-08-15
Debian DSA-3607-1 kernel 2016-06-28
Ubuntu USN-2967-2 linux-ti-omap4 2016-05-09
Ubuntu USN-2971-3 linux-raspi2 2016-05-09
Ubuntu USN-2971-2 linux-lts-wily 2016-05-09
Ubuntu USN-2970-1 linux-lts-vivid 2016-05-09
Ubuntu USN-2969-1 linux-lts-utopic 2016-05-09
Ubuntu USN-2968-2 linux-lts-trusty 2016-05-09
Ubuntu USN-2967-1 kernel 2016-05-09
Ubuntu USN-2968-1 kernel 2016-05-09
Ubuntu USN-2971-1 kernel 2016-05-09
SUSE SUSE-SU-2016:1203-1 kernel 2016-05-03
SUSE SUSE-SU-2016:1102-1 kernel 2016-04-19
Scientific Linux SLSA-2016:2574-2 kernel 2016-12-14
SUSE SUSE-SU-2016:0911-1 kernel 2016-03-30
Debian DSA-3426-1 kernel 2015-12-17
Ubuntu USN-2886-2 linux-ti-omap4 2016-02-01
Ubuntu USN-2890-3 linux-raspi2 2016-02-01
Ubuntu USN-2890-2 linux-lts-wily 2016-02-01
Ubuntu USN-2889-2 linux-lts-vivid 2016-02-01
Ubuntu USN-2888-1 linux-lts-utopic 2016-02-01
Ubuntu USN-2887-2 linux-lts-trusty 2016-02-01
Ubuntu USN-2886-1 kernel 2016-02-01
Ubuntu USN-2887-1 kernel 2016-02-01
Ubuntu USN-2889-1 kernel 2016-02-01
Ubuntu USN-2890-1 kernel 2016-02-01
Fedora FEDORA-2015-c4ed00a68f kernel 2015-12-16
Fedora FEDORA-2015-ac9a19888e kernel 2015-12-16

Comments (none posted)

knot: out-of-bound read

Package(s):knot CVE #(s):
Created:December 11, 2015 Updated:December 16, 2015
Description:

From the Fedora advisory:

New upstream release: - security fix: out-of-bound read in packet parser for malformed NAPTR record.

Alerts:
Fedora FEDORA-2015-b5a8f09e32 knot 2015-12-11
Fedora FEDORA-2015-df0f324367 knot 2015-12-11

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):firefox thunderbird seamonkey CVE #(s):CVE-2015-7201 CVE-2015-7202 CVE-2015-7203 CVE-2015-7204 CVE-2015-7205 CVE-2015-7207 CVE-2015-7208 CVE-2015-7210 CVE-2015-7211 CVE-2015-7212 CVE-2015-7213 CVE-2015-7214 CVE-2015-7215 CVE-2015-7216 CVE-2015-7217 CVE-2015-7218 CVE-2015-7219 CVE-2015-7220 CVE-2015-7221 CVE-2015-7222 CVE-2015-7223
Created:December 16, 2015 Updated:April 18, 2016
Description: From the Arch Linux advisory:

- CVE-2015-7201 CVE-2015-7202 (arbitrary code execution): Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

- CVE-2015-7203 CVE-2015-7220 CVE-2015-7221 (buffer overflow): Security researcher Ronald Crane reported three buffer overflows affecting released code that were found through code inspection. They do not all have clear mechanisms to be exploited through web content but are vulnerable if a mechanism can be found to trigger them.

- CVE-2015-7204 (denial of service): Security researcher Cajus Pollmeier reported crashing during some Javascript variable assignments. The issue was caused by an implementation error with unboxed objects and property storing in the JavaScript engine. This error could result in a potentially exploitable crash when triggered by JavaScript content as well as leading to errors on some websites.

- CVE-2015-7205 (information disclosure): Security researcher Ronald Crane reported an underflow found through code inspection. This does not all have a clear mechanism to be exploited through web content but could be vulnerable if a means can be found to trigger it.

- CVE-2015-7207 (same-origin policy bypass): Security researcher cgvwzq reported that it is possible to read cross-origin URLs following a redirect if perfomance.getEntries() is used along with an iframe to host a page. Navigating back in history through script, content is pulled from the browser cache for the redirected location instead of going to the original location. This is a same-origin policy violation and could allow for data theft.

- CVE-2015-7208 (cookie injection): Security researcher musicDespiteEverything reported an issue when ASCII code 11 for vertical tab is stored in a cookie in violation of RFC6265. This may result in incorrect cookie handling by servers, resulting in the potential ability to set cookie values and read cookie data from users in concert with some web servers if the vertical tab character is mishandled during parsing.

- CVE-2015-7210 (arbitrary code execution): Security researcher Looben Yang reported a use-after-free error in WebRTC that occurs due to timing issues in WebRTC when closing channels. WebRTC may still believe is has a datachannel open after another WebRTC function has closed it. This results in attempts to use the now destroyed datachannel, leading to a potentially exploitable crash.

- CVE-2015-7211 (URL spoofing): Security researcher Abdulrahman Alqabandi reported that when a data: URI is parsed, the hash ('#') symbol is incorrectly handled, allowing for spoofing attacks. This issue could result in the wrong URI being displayed as a location, which can mislead users to believe they are on a different site than the one loaded.

- CVE-2015-7212 (denial of service): Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an integer overflow when when allocating textures of extremely larges sizes during graphics operations. This results in a potentially exploitable crash when triggered.

- CVE-2015-7213 (denial of service): Security researcher Ronald Crane reported a vulnerability found through code inspection. This issue is an integer overflow while processing an MP4 format video file when an a erroneously-small buffer is allocated and then overrun, resulting in a potentially exploitable crash.

- CVE-2015-7214 (cross-origin restriction bypass): Security researcher Tsubasa Iinuma reported a mechanism to violate same-origin policy to content using data: and view-soure: URIs to confuse protections and bypass restrictions. This resulted in the ability to read data from cross-site URLs and local files.

- CVE-2015-7215 (information disclosure): Security researcher Masato Kinugawa reported a cross-origin information leak through the error events in web workers. This violates same-origin policy and the leaked information could potentially be used by a malicious party to gather authentication tokens and other data from third-party websites.

- CVE-2015-7216 CVE-2015-7217 (denial of service): Security researcher Gustavo Grieco reported that on Linux Gnome systems the dialog for choosing local files uses the operating system's gdk-pixbuf library to render thumbnails for image file types. This library supports various image decoders, and Grieco reported that the Jasper and TGA decoders were unmaintained and have several known vulnerabilities. Firefox has disabled the use of those decoders in gdk-pixbuf.

- CVE-2015-7218 CVE-2015-7219 (denial of service): Security researcher Stuart Larsen reported two issues with HTTP/2 resulting in integer underflows that lead to intentional aborts when the errors are detected. In the first issue, if a malformed HTTP2 header frame is received with only a single byte, an integer underflow can be created in some circumstances. In the second issue, a malformed HTTP2 PushPromse frame is received and the length of the decompressed buffer is miscalculated, leading to another integer underflow. In both of these instances, more memory is allocated than is allowed, triggering assertions and intentional aborts (a denial of service) but no exploitable crashes.

- CVE-2015-7222 (denial of service): Mozilla developer Gerald Squelart fixed an integer underflow in the libstagefright library initially reported by Joshua Drake to Google. The issues occurred in MP4 format video file while parsing cover metadata, leading to a buffer overflow. This results in a potentially exploitable crash and can be triggered by a malformed MP4 file served by web content.

- CVE-2015-7223 (privilege escalation): Mozilla developer Kris Maglione reported a mechanism where WebExtension APIs could be used to escalate privilege. This could allow arbitrary web content to execute code with the privileges of a particular WebExtension when using these API calls. Depending on the privileges of the extension used, this could result in personal information theft and cross-site scripting (XSS) attacks, including theft of browser cookies. This is mitigated by the requirement to have a WebExtension installed that is vulnerable to this issue.

Alerts:
openSUSE openSUSE-SU-2016:0306-1 firefox 2016-02-02
Ubuntu USN-2859-1 thunderbird 2016-01-13
Scientific Linux SLSA-2016:0001-1 thunderbird 2016-01-06
CentOS CESA-2016:0001 thunderbird 2016-01-06
CentOS CESA-2016:0001 thunderbird 2016-01-06
CentOS CESA-2016:0001 thunderbird 2016-01-06
Oracle ELSA-2016-0001 thunderbird 2016-01-05
Oracle ELSA-2016-0001 thunderbird 2016-01-05
Red Hat RHSA-2016:0001-01 thunderbird 2016-01-05
Fedora FEDORA-2015-6d64c257cf thunderbird 2016-01-02
openSUSE openSUSE-SU-2015:2406-1 Mozilla 2015-12-31
Debian DSA-3432-1 icedove 2016-01-01
Gentoo 201512-10 firefox 2015-12-30
Mageia MGASA-2015-0492 thunderbird 2015-12-28
openSUSE openSUSE-SU-2015:2380-1 xulrunner 2015-12-28
Arch Linux ASA-201512-14 thunderbird 2015-12-25
Slackware SSA:2015-357-01 mozilla-thunderbird 2015-12-23
openSUSE openSUSE-SU-2015:2353-1 firefox 2015-12-24
SUSE SUSE-SU-2015:2336-1 firefox 2015-12-21
SUSE SUSE-SU-2015:2334-1 firefox 2015-12-21
SUSE SUSE-SU-2015:2335-1 firefox 2015-12-21
Slackware SSA:2016-106-01 thunderbird 2016-04-15
Slackware SSA:2016-085-02 thunderbird 2016-03-25
openSUSE openSUSE-SU-2016:0894-1 thunderbird 2016-03-26
Mageia MGASA-2016-0124 iceape 2016-03-25
openSUSE openSUSE-SU-2016:0876-1 thunderbird 2016-03-24
Mageia MGASA-2016-0105 firefox 2016-03-09
Fedora FEDORA-2015-7ab3d3afcf firefox 2015-12-22
Scientific Linux SLSA-2015:2657-1 firefox 2015-12-17
Fedora FEDORA-2015-51b1105902 firefox 2015-12-18
openSUSE openSUSE-SU-2016:0309-1 firefox 2016-02-02
openSUSE openSUSE-SU-2016:0308-1 Seamonkey 2016-02-02
openSUSE openSUSE-SU-2016:0307-1 seamonkey 2016-02-02
Oracle ELSA-2015-2657 firefox 2015-12-16
Oracle ELSA-2015-2657 firefox 2015-12-16
Oracle ELSA-2015-2657 firefox 2015-12-16
Mageia MGASA-2015-0477 firefox 2015-12-16
Debian DSA-3422-1 iceweasel 2015-12-16
CentOS CESA-2015:2657 firefox 2015-12-16
CentOS CESA-2015:2657 firefox 2015-12-16
CentOS CESA-2015:2657 firefox 2015-12-17
Red Hat RHSA-2015:2657-01 firefox 2015-12-16
Ubuntu USN-2833-1 firefox 2015-12-15
Slackware SSA:2015-349-03 firefox 2015-12-15
Fedora FEDORA-2015-c7b1be8823 seamonkey 2015-12-16
Fedora FEDORA-2015-28e56e52e7 seamonkey 2015-12-16
Arch Linux ASA-201512-9 firefox 2015-12-16

Comments (none posted)

oxide-qt: code execution

Package(s):oxide-qt CVE #(s):CVE-2015-8478
Created:December 11, 2015 Updated:December 16, 2015
Description:

From the Ubuntu advisory:

Multiple security issues were discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process.

Alerts:
Ubuntu USN-2825-1 oxide-qt 2015-12-10

Comments (none posted)

proftpd: denial of service

Package(s):proftpd CVE #(s):
Created:December 14, 2015 Updated:December 24, 2015
Description: From the Red Hat bugzilla:

Part of the SFTP handshake involves "extensions", which are key/value pairs, comprised of strings. In SSH, strings are encoded for network transport as a 32-bit length, followed by the bytes.

The mod_sftp module currently places no bounds/length limitations when reading these SFTP extension key/value data from the network. A malicious attacker might attempt to encode large values, and allocate more memory than is necessary.

To avoid undue resource exhaustion by a remote client, mod_sftp should place a limit on the maximum length of acceptable extension keys/values.

Alerts:
Mageia MGASA-2015-0485 proftpd 2015-12-24
Fedora FEDORA-2015-97055df8a0 proftpd 2015-12-12
Fedora FEDORA-2015-7a89e8db70 proftpd 2015-12-11

Comments (none posted)

pygments: shell injection

Package(s):pygments CVE #(s):CVE-2015-8557
Created:December 16, 2015 Updated:December 5, 2016
Description: From the Debian LTS advisory:

It was discovered that there was a shell injection vulnerability in pygments, a syntax highlighting package written in Python.

Alerts:
Debian DSA-3445-1 pygments 2016-01-13
Ubuntu USN-2862-1 pygments 2016-01-07
Gentoo 201612-05 pygments 2016-12-04
Mageia MGASA-2015-0478 python-pygments 2015-12-17
Debian-LTS DLA-369-1 pygments 2015-12-15

Comments (none posted)

qemu: denial of service

Package(s):qemu CVE #(s):CVE-2015-8504
Created:December 14, 2015 Updated:December 29, 2015
Description: From the Red Hat bugzilla:

Qemu emulator built with the VNC display driver support is vulnerable to an arithmetic exception flaw. It occurs on the VNC server side while processing the 'SetPixelFormat' messages from a client.

A privileged remote client could use this flaw to crash the guest resulting in DoS.

Alerts:
openSUSE openSUSE-SU-2016:2494-1 xen 2016-10-11
SUSE SUSE-SU-2016:1785-1 kvm 2016-07-11
openSUSE openSUSE-SU-2016:1750-1 qemu 2016-07-06
SUSE SUSE-SU-2016:1745-1 xen 2016-07-06
SUSE SUSE-SU-2016:1703-1 qemu 2016-06-29
SUSE SUSE-SU-2016:1698-1 kvm 2016-06-28
Mageia MGASA-2016-0023 qemu 2016-01-17
openSUSE openSUSE-SU-2016:0126-1 xen 2016-01-14
openSUSE openSUSE-SU-2016:0124-1 xen 2016-01-14
openSUSE openSUSE-SU-2016:0123-1 xen 2016-01-14
Fedora FEDORA-2015-b406a8e4f2 qemu 2015-12-29
SUSE SUSE-SU-2016:1560-1 qemu 2016-06-13
SUSE SUSE-SU-2016:1318-1 xen 2016-05-17
SUSE SUSE-SU-2016:1154-1 xen 2016-04-26
SUSE SUSE-SU-2016:0955-1 xen 2016-04-05
SUSE SUSE-SU-2016:0873-1 xen 2016-03-24
SUSE SUSE-SU-2016:0658-1 Xen 2016-03-04
Debian DSA-3470-1 qemu-kvm 2016-02-08
Debian DSA-3471-1 qemu 2016-02-08
Debian DSA-3469-1 qemu 2016-02-08
Fedora FEDORA-2015-08e4af5a20 xen 2015-12-20
Gentoo 201602-01 qemu 2016-02-04
Ubuntu USN-2891-1 qemu, qemu-kvm 2016-02-03
Fedora FEDORA-2015-12a089920e xen 2015-12-17
Fedora FEDORA-2015-b2e8518b8e qemu 2015-12-14

Comments (none posted)

xen: denial of service

Package(s):xen CVE #(s):CVE-2015-6654
Created:December 10, 2015 Updated:December 16, 2015
Description: From the Xen security advisory:

XENMAPSPACE_gmfn_foreign dumps the p2m, on ARM, when it fails to get a reference on the foreign page. However, dump_p2m_lookup does not use rate-limited printk.

A malicious infrastructure domain, which is allowed to map memory of a foreign guest, would be able to flood the Xen console.

Domains deliberately given partial management control may be able to deny service to other parts of the system.

As a result, in a system designed to enhance security by radically disaggregating the management, the security may be reduced. But, the security will be no worse than a non-disaggregated design.

Alerts:
Mageia MGASA-2016-0098 xen 2016-03-07
Debian DSA-3414-1 xen 2015-12-09

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2015, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds