|
|
Subscribe / Log in / New account

Security

The HTTPS bicycle attack

By Jake Edge
January 20, 2016

While HTTPS is an encrypted protocol, it does leak a certain amount of information about the communication—the source and destination addresses, at a minimum. But a newly reported technique can actually "see" inside of the encrypted data without requiring the key or cracking the encryption. By using the length information inherent in the protocol, some simple math can be done to determine the length of some portions of the encrypted data, which can be used to figure out things like password length. It only requires a recording of the packets in a session of interest, along with a bit of information about the target, which means it can be performed days or months later.

In a paper [PDF], Guido Vranken described the weakness that he has dubbed the "HTTPS bicycle attack". The name comes from the idea that wrapping a bicycle as a gift doesn't really hide what is inside the package. Similarly, HTTPS doesn't entirely obscure the contents of its encrypted payloads.

Vranken concentrates on stream ciphers in the paper, noting that they have a 1:1 relationship between the plain text and the cipher text; adding one byte to the plain text results in an additional encrypted byte in the HTTPS payload. The attack only considers messages that have the "application data" content type (0x17 in the first byte) and uses the length information stored at the fourth and fifth bytes of the message. From that, coupled with a little detective work, things like the length of a password submitted to the site can be derived.

The bicycle technique will be most effective for targeted attacks, where an eavesdropper can record the traffic to and from a host of interest. In particular, the "user agent" header being sent by the browser (or, really, its length) is helpful, though not necessarily required. It can be captured, along with other standard headers sent by the user's browser, from a regular HTTP request to any site. There may be other unknown headers in the HTTPS requests, but their length can be deduced from other encrypted requests as Vranken has shown.

The other major piece of the puzzle is that the attacker must also record their own session that exercises the web application in the same way that the victim has. Because they can decode their own traffic, the attacker gains the knowledge of the contents and lengths of various resources requested in the process. That allows the attacker to figure out which HTTPS messages correspond to the ones they are interested in.

For example, if a particular login page consists of half a dozen different resources (e.g. images, style sheets), each with a distinct length, it is relatively straightforward to isolate that part of encrypted stream even if the requests are handled in a different order. In addition, the analysis can ignore any constant difference in the sizes of the requests that comes from additional or different headers that the victim's browser sends. (Vranken used Pearson correlation to match a WordPress login page and its resources in the paper).

Once the messages of interest are identified, the request that sends the login credentials is scrutinized. Its length will consist of a mixture of known headers, unknown headers, and the actual form parameters that are being submitted. The length of the unknown headers can be derived from the other requests since the attacker knows the lengths they recorded from their own session. The difference between those other requests and what the attacker recorded can be used to adjust the length of the authentication message, which just leaves the length of the form parameters.

The login credentials consist of both a username and password, of course, so all of the analysis only gives the combined length of the two. That, again, is where targeting comes in. In general, finding out the username for a target is not that difficult. Subtracting its length gives the attacker the length of the target's password.

That may seem like a fair amount of work just to get the length of the password, but that can be used in various ways to potentially compromise the account (e.g. brute force, dictionary attacks). In addition, Vranken showed several other ways that the length of a string in a web request or response (e.g. geographic coordinates, IP addresses) might be used to peer inside the encrypted data to extract useful information.

Vranken offered some suggestions for mitigating the problem. Using JavaScript to hash the password (using SHA-256, say) on the client side would be one way to do that, since all passwords would hash to the same length. That would also mean that the server never has access to the plain-text password. While that would be advantageous in some ways, it would prevent the server from validating the password (e.g. that it must contain letters and digits), which might be undesirable.

Padding the password is another option, though there are some potential pitfalls there. Ensuring that the browser does not strip the padding characters is obviously essential. Variable-length padding seems attractive, but will actually leak information as well. Vranken recommended using the ASCII NUL ("\0") character for padding, then hexadecimal-encoding the password plus padding into a string to be sent to the server.

This attack is another reminder that encrypted communication is not necessarily a panacea. There are certainly government security agencies that have tons of HTTPS traffic stored that could be used to target a variety of web applications for a subject of interest. Placing the length parameter in the unencrypted portion of the message certainly helps here; if the message boundaries were obscured, this kind of attack would be more difficult, at a minimum.

Comments (14 posted)

Brief items

Security quotes of the week

It would, in my view, be abject insanity not to assume that half a dozen or more nation-states (or their associated contractors) have code execution exploits against popular basebands in stock.

So long as basebands are not audited, and smartphones do not possess IOMMUs and have their operating systems configure them in a way that effectively mitigates the threat, no smartphone can be trusted for the integrity or confidentiality of any data it processes.

Hugo Landau

Any attempt to backdoor strong encryption systems will by definition make them immensely vulnerable not only to abuse by authorities, but also to outside hacking -- including by sophisticated terrorist groups! -- that would put all honest users at immense risk as ever more of our financial and other aspects of our personal lives are online.

It doesn't matter if you break up the backdoor key into a thousand pieces and distribute them to Boy and Girl Scouts sworn to only use them in a national emergency.

Lauren Weinstein

Is it not our responsibility as Free software community (or even just as citizens) to provide the tools that maximize privacy for the users? If the answer is yes, then I suppose the measurement for success is how much can we make possible while maximizing privacy? How attractive can we make the tools in terms of functionality, effectiveness and availability?

A happy user is one who finds that a useful and fun-to-use tool also protects him from threats that he often may not fully appreciate until it’s too late.

Sebastian Kügler

Comments (1 posted)

De Raadt: Important SSH patch coming soon

Theo de Raadt suggests that a significant OpenSSH security issue is about to be exposed; the message reads, in full: "Important SSH patch coming soon. For now, every on all operating systems, please do the following: Add undocumented 'UseRoaming no' to ssh_config or use '-oUseRoaming=no' to prevent upcoming #openssh client bug CVE-2016-0777. More later."

Update: that important patch appears to be OpenSSH 7.1p2, available now. "The OpenSSH client code between 5.4 and 7.1 contains experimential support for resuming SSH-connections (roaming). The matching server code has never been shipped, but the client code was enabled by default and could be tricked by a malicious server into leaking client memory to the server, including private client user keys." There are a few other security fixes there as well.

Update 2: see the Qualys advisory for vast amounts of detail.

Full Story (comments: 41)

An unpleasant local kernel vulnerability

Perception Point discloses a use-after-free vulnerability in the kernel's keyring subsystem; it is exploitable for local privilege escalation. "If a process causes the kernel to leak 0x100000000 references to the same object, it can later cause the kernel to think the object is no longer referenced and consequently free the object. If the same process holds another legitimate reference and uses it after the kernel freed the object, it will cause the kernel to reference deallocated, or a reallocated memory. This way, we can achieve a use-after-free, by using the exact same bug from before. A lot has been written on use-after-free vulnerability exploitation in the kernel, so the following steps wouldn’t surprise an experienced vulnerability researcher." This bug, introduced in 3.8, looks like a good one to patch quickly; of course, for vast numbers of users of mobile and embedded systems, that may not be an option.

Comments (20 posted)

Linux Kernel ROP - Ropping your way to #

This article from Cysec Labs starts a series explaining how return-oriented programming (ROP) can be used to exploit vulnerabilities in the kernel. "ROP techniques take advantage of code misalignment to identify new gadgets. This is possible due to x86 language density, i.e., the x86 instruction set is large enough (and instructions have different lengths), that almost any sequence of bytes can be interpreted as a valid instruction."

Comments (none posted)

New vulnerabilities

bind9: denial of service

Package(s):bind9 CVE #(s):CVE-2015-8704
Created:January 20, 2016 Updated:February 29, 2016
Description: From the Debian advisory:

It was discovered that specific APL RR data could trigger an INSIST failure in apl_42.c and cause the BIND DNS server to exit, leading to a denial-of-service.

Alerts:
Oracle ELSA-2016-2094 bind97 2016-10-21
Oracle ELSA-2016-2093 bind 2016-10-21
Gentoo 201610-07 bind 2016-10-11
Fedora FEDORA-2016-1ab53bf440 bind 2016-02-02
Scientific Linux SLSA-2016:0074-1 bind97 2016-01-27
Scientific Linux SLSA-2016:0073-1 bind 2016-01-27
Oracle ELSA-2016-0074 bind97 2016-01-27
Oracle ELSA-2016-0073 bind 2016-01-27
Oracle ELSA-2016-0073 bind 2016-01-27
Oracle ELSA-2016-0073 bind 2016-01-27
CentOS CESA-2016:0074 bind97 2016-01-27
CentOS CESA-2016:0073 bind 2016-01-27
CentOS CESA-2016:0073 bind 2016-01-27
CentOS CESA-2016:0073 bind 2016-01-27
Red Hat RHSA-2016:0074-01 bind97 2016-01-27
Red Hat RHSA-2016:0073-01 bind 2016-01-27
SUSE SUSE-SU-2016:0227-1 bind 2016-01-25
openSUSE openSUSE-SU-2016:0204-1 bind 2016-01-22
Fedora FEDORA-2016-feb8d77f36 bind99 2016-01-24
Fedora FEDORA-2016-f3517b9c4c bind 2016-01-24
openSUSE openSUSE-SU-2016:0199-1 bind 2016-01-22
openSUSE openSUSE-SU-2016:0197-1 bind 2016-01-22
SUSE SUSE-SU-2016:0180-1 bind 2016-01-20
Mageia MGASA-2016-0030 bind 2016-01-20
Arch Linux ASA-201601-21 bind 2016-01-21
Ubuntu USN-2874-1 bind9 2016-01-19
SUSE SUSE-SU-2016:0174-1 bind 2016-01-20
Debian-LTS DLA-396-1 bind9 2016-01-19
Debian DSA-3449-1 bind9 2016-01-19
Fedora FEDORA-2016-1323b9078a bind99 2016-02-28
Slackware SSA:2016-054-01 bind 2016-02-23

Comments (none posted)

cacti: SQL injection

Package(s):cacti CVE #(s):CVE-2015-8604
Created:January 14, 2016 Updated:January 20, 2016
Description: From the Debian-LTS advisory:

It was discovered that there was another SQL injection vulnerability in cacti, a web interface for graphing monitoring systems.

Alerts:
Gentoo 201607-05 cacti 2016-07-16
Mageia MGASA-2016-0025 cacti 2016-01-20
Debian-LTS DLA-386-1 cacti 2016-01-14
Debian DSA-3494-1 cacti 2016-02-27
Arch Linux ASA-201602-24 cacti 2016-02-28
openSUSE openSUSE-SU-2016:0440-1 cacti 2016-02-12
openSUSE openSUSE-SU-2016:0438-1 cacti 2016-02-12
openSUSE openSUSE-SU-2016:0437-1 cacti 2016-02-12

Comments (none posted)

dbconfig-common: information leak

Package(s):dbconfig-common CVE #(s):
Created:January 15, 2016 Updated:January 20, 2016
Description:

From the Debian-LTS advisory:

It was discovered that dbconfig-common could, depending on the local umask, make PostgreSQL database backups that were readable by other users than the database owner.

Alerts:
Debian-LTS DLA-390-1 dbconfig-common 2016-01-15

Comments (none posted)

docker: information disclosure

Package(s):docker go CVE #(s):CVE-2015-8618
Created:January 18, 2016 Updated:May 18, 2016
Description: From the Arch Linux advisory:

This issue can affect RSA computations in crypto/rsa, which is used by crypto/tls. TLS servers on 32-bit systems could plausibly leak their RSA private key due to this issue. Other protocol implementations that create many RSA signatures could also be impacted in the same way.

Specifically, incorrect results in one part of the RSA Chinese Remainder computation can cause the result to be incorrect in such a way that it leaks one of the primes. While RSA blinding should prevent an attacker from crafting specific inputs that trigger the bug, on 32-bit systems the bug can be expected to occur at random around one in 2^26 times. Thus collecting around 64 million signatures (of known data) from an affected server should be enough to extract the private key used.

On 64-bit systems, the frequency of the bug is so low (less than one in 2^50) that it would be very difficult to exploit. Nonetheless, everyone is strongly encouraged to upgrade.

A remote unauthenticated attacker can extract a private RSA key by passively collecting signatures.

Alerts:
Fedora FEDORA-2016-2dcc094217 golang 2016-01-26
Fedora FEDORA-2016-5a073cbd93 golang 2016-01-17
Arch Linux ASA-201601-16 syncthing 2016-01-17
Arch Linux ASA-201601-15 keybase 2016-01-17
Arch Linux ASA-201601-14 hub 2016-01-17
Arch Linux ASA-201601-13 go-ipfs 2016-01-17
Arch Linux ASA-201601-11 go 2016-01-16
Arch Linux ASA-201601-12 docker 2016-01-17
openSUSE openSUSE-SU-2016:1331-1 go 2016-05-18

Comments (none posted)

dwarfutils: information leak

Package(s):dwarfutils CVE #(s):CVE-2015-8750
Created:January 15, 2016 Updated:January 21, 2016
Description:

From the Debian advisory:

It was discovered that there was a NULL deference in dwarfutils, a tool to dump DWARF debug information from ELF objects.

Alerts:
Debian-LTS DLA-669-1 dwarfutils 2016-10-19
Arch Linux ASA-201601-22 libdwarf 2016-01-21
Debian-LTS DLA-388-1 dwarfutils 2016-01-15

Comments (none posted)

ecryptfs-utils: privilege escalation

Package(s):ecryptfs-utils CVE #(s):CVE-2016-1572
Created:January 20, 2016 Updated:February 17, 2016
Description: From the Debian advisory:

Jann Horn discovered that the setuid-root mount.ecryptfs_private helper in the ecryptfs-utils would mount over any target directory that the user owns, including a directory in procfs. A local attacker could use this flaw to escalate his privileges.

Alerts:
openSUSE openSUSE-SU-2016:0302-1 ecryptfs-utils 2016-02-01
openSUSE openSUSE-SU-2016:0291-1 ecryptfs-utils 2016-01-31
openSUSE openSUSE-SU-2016:0239-1 ecryptfs-utils 2016-01-25
Arch Linux ASA-201601-25 ecryptfs-utils 2016-01-25
Ubuntu USN-2876-1 ecryptfs-utils 2016-01-20
Debian-LTS DLA-397-1 ecryptfs-utils 2016-01-20
Debian DSA-3450-1 ecryptfs-utils 2016-01-20
Fedora FEDORA-2016-7b9a2fe987 ecryptfs-utils 2016-02-17
Fedora FEDORA-2016-b02ad4e424 ecryptfs-utils 2016-02-17

Comments (none posted)

ffmpeg: multiple vulnerabilities

Package(s):ffmpeg CVE #(s):CVE-2015-6818 CVE-2015-6820 CVE-2015-6821 CVE-2015-6822 CVE-2015-6823 CVE-2015-6824 CVE-2015-6825 CVE-2015-6826
Created:January 15, 2016 Updated:January 20, 2016
Description:

From the Mageia advisory:

CVE-2015-6818 - The decode_ihdr_chunk function in libavcodec/pngdec.c in FFmpeg before 2.4.11 does not enforce uniqueness of the IHDR (aka image header) chunk in a PNG image, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted image with two or more of these chunks.

CVE-2015-6820 - The ff_sbr_apply function in libavcodec/aacsbr.c in FFmpeg before 2.4.11 does not check for a matching AAC frame syntax element before proceeding with Spectral Band Replication calculations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted AAC data.

CVE-2015-6821 - The ff_mpv_common_init function in libavcodec/mpegvideo.c in FFmpeg before 2.4.11 does not properly maintain the encoding context, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via crafted MPEG data.

CVE-2015-6822 - The destroy_buffers function in libavcodec/sanm.c in FFmpeg before 2.4.11 does not properly maintain height and width values in the video context, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via crafted LucasArts Smush video data.

CVE-2015-6823 - The allocate_buffers function in libavcodec/alac.c in FFmpeg before 2.4.11 does not initialize certain context data, which allows remote attackers to cause a denial of service (segmentation violation) or possibly have unspecified other impact via crafted Apple Lossless Audio Codec (ALAC) data.

CVE-2015-6824 - The sws_init_context function in libswscale/utils.c in FFmpeg before 2.4.11 does not initialize certain pixbuf data structures, which allows remote attackers to cause a denial of service (segmentation violation) or possibly have unspecified other impact via crafted video data.

CVE-2015-6825 - The ff_frame_thread_init function in libavcodec/pthread_frame.c in FFmpeg before 2.4.11 mishandles certain memory-allocation failures, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via a crafted file, as demonstrated by an AVI file.

CVE-2015-6826 - The ff_rv34_decode_init_thread_copy function in libavcodec/rv34.c in FFmpeg before 2.4.11 does not initialize certain structure members, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via crafted RV30 or RV40 RealVideo data.

Alerts:
Mageia MGASA-2016-0018 ffmpeg 2016-01-15
Ubuntu USN-2944-1 libav 2016-04-04

Comments (none posted)

ffmpeg: cross-origin attacks

Package(s):ffmpeg CVE #(s):CVE-2016-1897 CVE-2016-1898
Created:January 18, 2016 Updated:March 7, 2016
Description: From the CVE entries:

FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file. (CVE-2016-1897)

FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file. (CVE-2016-1898)

Alerts:
openSUSE openSUSE-SU-2016:0243-1 ffmpeg 2016-01-25
Gentoo 201606-09 ffmpeg 2016-06-19
Arch Linux ASA-201601-17 ffmpeg 2016-01-17
Ubuntu USN-2944-1 libav 2016-04-04
Debian DSA-3506-1 libav 2016-03-04
Mageia MGASA-2016-0060 ffmpeg 2016-02-09
Slackware SSA:2016-034-02 MPlayer 2016-02-03

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2015-8539
Created:January 19, 2016 Updated:January 20, 2016
Description: From the SUSE bugzilla entry:

If a user key gets negatively instantiated, an error code is cached in the payload area. A negatively instantiated key may be then be positively instantiated by updating it with valid data. However, the ->update key type method must be aware that the error code may be there.

The paging address is predictable and mappable as userspace memory and can be used by abused by an attacker to escalate privileges.

Alerts:
openSUSE openSUSE-SU-2016:2649-1 kernel 2016-10-26
SUSE SUSE-SU-2016:2074-1 kernel 2016-08-15
SUSE SUSE-SU-2016:1937-1 kernel 2016-08-02
openSUSE openSUSE-SU-2016:0280-1 kernel 2016-01-29
SUSE SUSE-SU-2016:0168-1 kernel 2016-01-19
SUSE SUSE-SU-2016:1203-1 kernel 2016-05-03
SUSE SUSE-SU-2016:1102-1 kernel 2016-04-19
SUSE SUSE-SU-2016:0911-1 kernel 2016-03-30
SUSE SUSE-SU-2016:0585-1 kernel 2016-02-25

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2013-4312 CVE-2015-7566 CVE-2015-8767 CVE-2016-0723
Created:January 19, 2016 Updated:February 1, 2016
Description: From the Debian advisory:

CVE-2013-4312: Tetsuo Handa discovered that it is possible for a process to open far more files than the process' limit leading to denial-of-service conditions.

CVE-2015-7566: Ralf Spenneberg of OpenSource Security reported that the visor driver crashes when a specially crafted USB device without bulk-out endpoint is detected.

CVE-2015-8767: An SCTP denial-of-service was discovered which can be triggered by a local attacker during a heartbeat timeout event after the 4-way handshake.

CVE-2016-0723: A use-after-free vulnerability was discovered in the TIOCGETD ioctl. A local attacker could use this flaw for denial-of-service.

Alerts:
Oracle ELSA-2016-2574 kernel 2016-11-10
Red Hat RHSA-2016:2584-02 kernel-rt 2016-11-03
Red Hat RHSA-2016:2574-02 kernel 2016-11-03
openSUSE openSUSE-SU-2016:2649-1 kernel 2016-10-26
Ubuntu USN-3083-2 linux-lts-trusty 2016-09-19
Ubuntu USN-3083-1 kernel 2016-09-19
SUSE SUSE-SU-2016:2245-1 kernel 2016-09-06
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
openSUSE openSUSE-SU-2016:2144-1 kernel 2016-08-24
SUSE SUSE-SU-2016:2074-1 kernel 2016-08-15
SUSE SUSE-SU-2017:0333-1 kernel 2017-01-30
SUSE SUSE-SU-2016:1764-1 kernel 2016-07-08
SUSE SUSE-SU-2016:1707-1 the Linux Kernel 2016-06-30
Scientific Linux SLSA-2016:1277-1 kernel 2016-06-24
Red Hat RHSA-2016:1341-01 kernel-rt 2016-06-27
SUSE SUSE-SU-2016:1672-1 the Linux Kernel 2016-06-24
Oracle ELSA-2016-1277 kernel 2016-06-23
CentOS CESA-2016:1277 kernel 2016-06-23
Red Hat RHSA-2016:1301-01 kernel-rt 2016-06-23
Red Hat RHSA-2016:1277-01 kernel 2016-06-23
Mageia MGASA-2016-0233 kernel-tmb 2016-06-22
Mageia MGASA-2016-0232 kernel-linus 2016-06-22
openSUSE openSUSE-SU-2016:0301-1 kernel 2016-02-01
Fedora FEDORA-2016-5d43766e33 kernel 2016-02-01
Fedora FEDORA-2016-2f25d12c51 kernel 2016-02-01
openSUSE openSUSE-SU-2016:0280-1 kernel 2016-01-29
Fedora FEDORA-2016-b59fd603be kernel 2016-01-26
Fedora FEDORA-2016-26e19f042a kernel 2016-01-20
Debian DSA-3448-1 kernel 2016-01-19
Scientific Linux SLSA-2016:0855-1 kernel 2016-06-16
Mageia MGASA-2016-0225 kernel 2016-06-13
Oracle ELSA-2016-3567 kernel 2.6.32 2016-05-20
Oracle ELSA-2016-3567 kernel 2.6.32 2016-05-20
Oracle ELSA-2016-3566 kernel 2.6.39 2016-05-20
Oracle ELSA-2016-3566 kernel 2.6.39 2016-05-20
Oracle ELSA-2016-3565 kernel 3.8.13 2016-05-20
Oracle ELSA-2016-3565 kernel 3.8.13 2016-05-20
Oracle ELSA-2016-3559 kernel 4.1.12 2016-05-17
Oracle ELSA-2016-3559 kernel 4.1.12 2016-05-17
Red Hat RHSA-2016:0855-01 kernel 2016-05-10
Ubuntu USN-2967-2 linux-ti-omap4 2016-05-09
Ubuntu USN-2967-1 kernel 2016-05-09
Oracle ELSA-2016-3554 kernel 4.1.12 2016-05-06
Oracle ELSA-2016-3554 kernel 4.1.12 2016-05-06
Oracle ELSA-2016-3553 kernel 2.6.32 2016-05-05
Oracle ELSA-2016-3553 kernel 2.6.32 2016-05-05
Oracle ELSA-2016-3552 kernel 2.6.39 2016-05-05
Oracle ELSA-2016-3552 kernel 2.6.39 2016-05-05
Oracle ELSA-2016-3551 kernel 3.8.13 2016-05-05
Oracle ELSA-2016-3551 kernel 3.8.13 2016-05-05
SUSE SUSE-SU-2016:1203-1 kernel 2016-05-03
Scientific Linux SLSA-2016:0715-1 kernel 2016-05-04
Oracle ELSA-2016-0715 kernel 2016-05-03
CentOS CESA-2016:0715 kernel 2016-05-04
Red Hat RHSA-2016:0715-01 kernel 2016-05-04
SUSE SUSE-SU-2016:1102-1 kernel 2016-04-19
Scientific Linux SLSA-2016:2574-2 kernel 2016-12-14
Ubuntu USN-2948-2 linux-lts-utopic 2016-04-11
openSUSE openSUSE-SU-2016:1008-1 kernel 2016-04-12
Ubuntu USN-2948-1 linux-lts-utopic 2016-04-06
SUSE SUSE-SU-2016:0911-1 kernel 2016-03-30
SUSE SUSE-SU-2016:3069-1 kernel 2016-12-09
Ubuntu USN-2930-3 linux-raspi2 2016-03-16
SUSE SUSE-SU-2016:0785-1 kernel 2016-03-16
Ubuntu USN-2930-2 linux-lts-wily 2016-03-14
Ubuntu USN-2932-1 linux-lts-vivid 2016-03-14
Ubuntu USN-2931-1 linux-lts-utopic 2016-03-14
Ubuntu USN-2929-2 linux-lts-trusty 2016-03-14
Ubuntu USN-2929-1 kernel 2016-03-14
Ubuntu USN-2930-1 kernel 2016-03-14
Debian DSA-3503-1 kernel 2016-03-03
SUSE SUSE-SU-2016:2976-1 the Linux Kernel 2016-12-02
Ubuntu USN-2908-5 linux-lts-wily 2016-02-27
Ubuntu USN-2908-4 kernel 2016-02-26
SUSE SUSE-SU-2016:0585-1 kernel 2016-02-25
Ubuntu USN-2908-3 linux-raspi2 2016-02-22
Ubuntu USN-2908-2 linux-lts-wily 2016-02-22
Ubuntu USN-2908-1 kernel 2016-02-22
openSUSE openSUSE-SU-2016:0537-1 kernel 2016-02-22
Debian-LTS DLA-412-1 linux-2.6 2016-02-06
openSUSE openSUSE-SU-2016:0318-1 kernel 2016-02-03

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2016-0728
Created:January 19, 2016 Updated:January 26, 2016
Description: From the Debian advisory:

CVE-2016-0728: The Perception Point research team discovered a use-after-free vulnerability in the keyring facility, possibly leading to local privilege escalation.

[See the Perception Point advisory for lots more information.]

Alerts:
Oracle ELSA-2016-2574 kernel 2016-11-10
openSUSE openSUSE-SU-2016:0301-1 kernel 2016-02-01
Fedora FEDORA-2016-5d43766e33 kernel 2016-02-01
openSUSE openSUSE-SU-2016:0280-1 kernel 2016-01-29
Fedora FEDORA-2016-b59fd603be kernel 2016-01-26
Scientific Linux SLSA-2016:0064-1 kernel 2016-01-25
Oracle ELSA-2016-0064 kernel 2016-01-25
CentOS CESA-2016:0064 kernel 2016-01-26
Red Hat RHSA-2016:0068-01 kernel-rt 2016-01-26
Red Hat RHSA-2016:0065-01 kernel-rt 2016-01-25
Red Hat RHSA-2016:0064-01 kernel 2016-01-25
SUSE SUSE-SU-2016:0205-1 kernel 2016-01-22
Arch Linux ASA-201601-26 linux-lts 2016-01-25
SUSE SUSE-SU-2016:0186-1 kernel 2016-01-20
Oracle ELSA-2016-3510 kernel 4.1.12 2016-01-20
Oracle ELSA-2016-3510 kernel 4.1.12 2016-01-20
Oracle ELSA-2016-3509 kernel 3.8.13 2016-01-20
Oracle ELSA-2016-3509 kernel 3.8.13 2016-01-20
Mageia MGASA-2016-0032 kernel-tmb 2016-01-21
Mageia MGASA-2016-0031 kernel-linus 2016-01-21
Mageia MGASA-2016-0033 kernel 2016-01-21
Ubuntu USN-2872-3 linux-raspi2 2016-01-19
Ubuntu USN-2872-2 linux-lts-wily 2016-01-19
Ubuntu USN-2871-2 linux-lts-vivid 2016-01-19
Ubuntu USN-2873-1 linux-lts-utopic 2016-01-19
Ubuntu USN-2870-1 kernel 2016-01-19
Ubuntu USN-2871-1 kernel 2016-01-19
Ubuntu USN-2872-1 kernel 2016-01-19
Ubuntu USN-2870-2 linux-lts-trusty 2016-01-19
Arch Linux ASA-201601-20 kernel 2016-01-20
Debian DSA-3448-1 kernel 2016-01-19
Oracle ELSA-2016-0185 kernel 2016-02-16
openSUSE openSUSE-SU-2016:0318-1 kernel 2016-02-03
Red Hat RHSA-2016:0103-01 kernel 2016-02-02

Comments (none posted)

librsvg: multiple vulnerabilities

Package(s):librsvg CVE #(s):CVE-2015-7557 CVE-2015-7558
Created:January 15, 2016 Updated:May 18, 2016
Description:

From the Mageia advisory:

Out-of-bounds heap read in librsvg2 was found when parsing SVG file (CVE-2015-7557).

Stack exhaustion due to cyclic dependency causing to crash an application was found in librsvg2 while parsing SVG file (CVE-2015-7558).

Alerts:
Debian-LTS DLA-395-1 librsvg 2016-01-19
Mageia MGASA-2016-0021 librsvg 2016-01-15
Debian DSA-3584-1 librsvg 2016-05-19
Debian-LTS DLA-477-1 librsvg 2016-05-18

Comments (none posted)

libtiff: code execution

Package(s):libtiff CVE #(s):CVE-2015-8665 CVE-2015-8683
Created:January 14, 2016 Updated:January 27, 2016
Description: From the Mageia advisory:

In libtiff, in tif_getimage.c, out-of-bound reads in the TIFFRGBAImage interface in case of unsupported values of SamplesPerPixel/ExtraSamples for LogLUV / CIELab (CVE-2015-8665, CVE-2015-8683).

Alerts:
Debian-LTS DLA-610-1 tiff3 2016-09-05
Scientific Linux SLSA-2016:1546-1 libtiff 2016-08-03
Scientific Linux SLSA-2016:1547-1 libtiff 2016-08-02
Oracle ELSA-2016-1546 libtiff 2016-08-02
CentOS CESA-2016:1547 libtiff 2016-08-02
CentOS CESA-2016:1546 libtiff 2016-08-02
Red Hat RHSA-2016:1547-01 libtiff 2016-08-02
Red Hat RHSA-2016:1546-01 libtiff 2016-08-02
Debian-LTS DLA-402-1 tiff 2016-01-26
Mageia MGASA-2016-0017 libtiff 2016-01-14
Gentoo 201701-16 tiff 2017-01-09
Ubuntu USN-2939-1 tiff 2016-03-23
openSUSE openSUSE-SU-2016:3035-1 tiff 2016-12-07
Arch Linux ASA-201611-26 libtiff 2016-11-25
Arch Linux ASA-201611-27 lib32-libtiff 2016-11-25
Debian DSA-3467-1 tiff 2016-02-06

Comments (none posted)

libxml2: denial of service

Package(s):libxml2 CVE #(s):CVE-2015-8710
Created:January 20, 2016 Updated:January 22, 2016
Description: From the Ubuntu advisory:

It was discovered that libxml2 incorrectly handled certain malformed documents. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause libxml2 to crash, resulting in a denial of service.

Alerts:
openSUSE openSUSE-SU-2016:0188-1 libxml2 2016-01-21
Ubuntu USN-2875-1 libxml2 2016-01-19
SUSE SUSE-SU-2016:0786-1 sles12-docker-image 2016-03-16

Comments (none posted)

libxmp: multiple vulnerabilities

Package(s):libxmp CVE #(s):
Created:January 20, 2016 Updated:January 20, 2016
Description: Version 4.3.10 fixes many bugs, some of which may be exploitable. See the changelog for details.
Alerts:
Fedora FEDORA-2016-8f950932c1 libxmp 2016-01-19
Fedora FEDORA-2016-64c69ec297 libxmp 2016-01-19

Comments (none posted)

mbedtls: memory leak

Package(s):mbedtls CVE #(s):
Created:January 20, 2016 Updated:January 20, 2016
Description: From the Red Hat bugzilla:

In case an entry with the given OID already exists in the list passed to mbedtls_asn1_store_named_data() and there is not enough memory to allocate room for the new value, the existing entry will be freed but the preceding entry in the list will sill hold a pointer to it. (And the following entries in the list are no longer reachable.) This results in memory leak or a double free.

Alerts:
Fedora FEDORA-2016-11cca392ff mbedtls 2016-01-19
Fedora FEDORA-2016-b3784096ef mbedtls 2016-01-19

Comments (none posted)

nodejs-ws: remote information disclosure

Package(s):nodejs-ws CVE #(s):
Created:January 14, 2016 Updated:January 20, 2016
Description: From the Red Hat bugzilla entry:

A vulnerability in the ping functionality of ws module which allowed clients to allocate memory by simply sending a ping frame. The ping functionality by default responds with a pong frame and the previously given payload of the ping frame. As a result, client receives non-zeroed out allocated buffer from server of arbitrary length. Assuming the usage of modern kernel, only the memory previously used and deallocated by the node process and the memory that has been previously allocated as a Buffer can be leaked using this way.

Alerts:
Fedora FEDORA-2016-3509d27585 nodejs-ws 2016-01-14
Fedora FEDORA-2016-a6f02951a2 nodejs-ws 2016-01-14

Comments (none posted)

openssh: multiple vulnerabilities

Package(s):openssh CVE #(s):CVE-2016-0777 CVE-2016-0778
Created:January 15, 2016 Updated:January 20, 2016
Description:

From the Arch Linux advisory:

CVE-2016-0777 (information disclosure) An information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client.

CVE-2016-0778 (arbitrary code execution) A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented that is leading to a file descriptor leak. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options (ProxyCommand, ForwardAgent or ForwardX11).

Alerts:
Fedora FEDORA-2016-2e89eba0c1 gsi-openssh 2016-02-01
Fedora FEDORA-2016-4556904561 gsi-openssh 2016-01-29
openSUSE openSUSE-SU-2016:0144-1 openssh 2016-01-16
openSUSE openSUSE-SU-2016:0145-1 openssh 2016-01-16
Mageia MGASA-2016-0022 openssh 2016-01-15
Gentoo 201601-01 openssh 2016-01-16
Fedora FEDORA-2016-c330264861 openssh 2016-01-17
Fedora FEDORA-2016-67c6ef0d4f openssh 2016-01-16
Slackware SSA:2016-014-01 openssh 2016-01-14
Ubuntu USN-2869-1 openssh 2016-01-14
SUSE SUSE-SU-2016:0117-1 openssh-openssl1 2016-01-14
SUSE SUSE-SU-2016:0120-1 openssh 2016-01-14
SUSE SUSE-SU-2016:0119-1 openssh 2016-01-14
SUSE SUSE-SU-2016:0118-1 openssh 2016-01-14
Scientific Linux SLSA-2016:0043-1 openssh 2016-01-14
Red Hat RHSA-2016:0043-01 openssh 2016-01-14
Oracle ELSA-2016-0043 openssh 2016-01-14
openSUSE openSUSE-SU-2016:0128-1 openssh 2016-01-15
openSUSE openSUSE-SU-2016:0127-1 openssh 2016-01-15
CentOS CESA-2016:0043 openssh 2016-01-14
Debian-LTS DLA-387-1 openssh 2016-01-14
Debian DSA-3446-1 openssh 2016-01-14
Arch Linux ASA-201601-9 openssh 2016-01-14

Comments (none posted)

openssh: out of-bound read access

Package(s):openssh CVE #(s):CVE-2016-1907
Created:January 18, 2016 Updated:January 20, 2016
Description: From the Red Hat bugzilla:

OpenSSH 7.1p2 release notes mention the following security fix:

* SECURITY: Fix an out of-bound read access in the packet handling code. Reported by Ben Hawkes.

Alerts:
Fedora FEDORA-2016-2e89eba0c1 gsi-openssh 2016-02-01
Fedora FEDORA-2016-4556904561 gsi-openssh 2016-01-29
Fedora FEDORA-2016-c330264861 openssh 2016-01-17
Ubuntu USN-2966-1 openssh 2016-05-09

Comments (none posted)

openstack-glance: unspecified

Package(s):openstack-glance CVE #(s):
Created:January 18, 2016 Updated:January 20, 2016
Description: An update to upstream 2015.1.2 fixes unspecified security issues.
Alerts:
Fedora FEDORA-2015-66439aa9e2 openstack-glance 2016-01-15

Comments (none posted)

php: multiple vulnerabilities

Package(s):php CVE #(s):CVE-2016-1903 CVE-2016-1904
Created:January 15, 2016 Updated:January 20, 2016
Description:

From the Arch Linux advisory:

CVE-2016-1903 (information disclosure) An out-of-bounds vulnerability has been discovered in ext/gd/libgd/gd_interpolation.c in the gdImageRotateInterpolated function. The background color of an image is passed in as an integer that represents an index to the color palette. As there is a lack of validation of that parameter, one can pass in a large number that exceeds the color palette array. This reads memory beyond the color palette. Information of the memory leak can then be obtained via the background color after the image has been rotated.

CVE-2016-1904 (arbitrary code execution) A not further specified integer overflow vulnerability has been discovered in ext/standard/exec.c (in the php_escape_shell_cmd function and the php_escape_shell_arg function). This issue results in a heap buffer overflow that is leading to a denial of service or possibly arbitrary code execution.

Alerts:
Red Hat RHSA-2016:2750-01 rh-php56 2016-11-15
openSUSE openSUSE-SU-2016:0251-1 php5 2016-01-26
Mageia MGASA-2016-0024 php 2016-01-17
Arch Linux ASA-201601-10 php 2016-01-14
Ubuntu USN-2952-2 php5 2016-04-27
Ubuntu USN-2952-1 php5 2016-04-21
openSUSE openSUSE-SU-2016:0366-1 php5 2016-02-07
Slackware SSA:2016-034-04 php 2016-02-03

Comments (none posted)

php: multiple vulnerabilities

Package(s):php CVE #(s):
Created:January 18, 2016 Updated:January 20, 2016
Description: From the Red Hat bugzilla:

1297730: It was found that an attacker can control type and val via get_zval_xmlrpc_type() with a crafted object-type ZVAL. Z_STRVAL_P macro and the Z_STRLEN_P macro handles a non-string-type val, which is able to look up an arbitrary memory address. This results in leaking arbitrary memory blocks, crash application or other issues.

1297726: It was found that attacker can deserialize a string-type ZVAL via php_wddx_deserialize_ex(), which means he is able to create fake HashTable via the Z_ARRVAL_P macro with the string-type ZVAL. This could result in arbitrary remote code execution.

1297720: A use-after free vulnerability was found that could possible lead to arbitrary remote code execution.

1297710: A memory leak and out-of-bounds write was found in fpm_log.c.

Alerts:
Fedora FEDORA-2016-5207e0c1a1 php 2016-01-16
Fedora FEDORA-2016-558167a417 php 2016-01-16

Comments (none posted)

python-kdcproxy: unspecified

Package(s):python-kdcproxy CVE #(s):CVE-2015-5159
Created:January 18, 2016 Updated:January 20, 2016
Description: An update to 0.3.1 fixes CVE-2015-5159.
Alerts:
Fedora FEDORA-2015-12739 python-kdcproxy 2016-01-15

Comments (none posted)

qemu: multiple vulnerabilities

Package(s):qemu CVE #(s):CVE-2015-8613 CVE-2015-8619 CVE-2015-8743 CVE-2016-1568 CVE-2016-1714
Created:January 18, 2016 Updated:February 1, 2016
Description: From the Mageia advisory:

A stack buffer-overflow vulnerability has been discovered in the QEMU emulator built with SCSI MegaRAID SAS HBA emulation support. The flaw occurs when processing the SCSI controller's CTRL_GET_INFO command. A privileged guest user could exploit this flaw to crash the QEMU process instance (denial of service). (CVE-2015-8613)

An out-of-bounds write vulnerability has been found in the QEMU emulator built with Human Monitor Interface(HMP) support. The issue occurs when the 'sendkey' command (in hmp_sendkey) is processed with a 'keyname_len' that is greater than the 'keyname_buf' array size. A user or process could exploit this flaw to crash the QEMU process instance (denial of service). (CVE-2015-8619)

An out-of-bounds read-write access flaw was found in the QEMU emulator built with NE2000-device emulation support. The flaw occurred while performing 'ioport' read-write operations. A privileged (CAP_SYS_RAWIO) user or process could exploit the flaw to leak or corrupt QEMU memory bytes (CVE-2015-8743)

A user-after-free vulnerability was discovered in the QEMU emulator built with IDE AHCI emulation support. The flaw could occur after processing AHCI Native Command Queuing(NCQ) AIO commands. A privileged user inside the guest could use this flaw to crash the QEMU process instance (denial of service) or potentially execute arbitrary code on the host with QEMU-process privileges (CVE-2016-1568).

An out-of-bounds read/write flaw was discovered in the QEMU emulator built with Firmware Configuration device emulation support. The flaw could occur while processing firmware configurations if the current configuration entry value was set to be invalid. A privileged(CAP_SYS_RAWIO) user or process inside the guest could exploit this flaw to crash the QEMU process instance (denial of service), or potentially execute arbitrary code on the host with QEMU-process privileges (CVE-2016-1714).

Alerts:
openSUSE openSUSE-SU-2016:2494-1 xen 2016-10-11
SUSE SUSE-SU-2016:1785-1 kvm 2016-07-11
openSUSE openSUSE-SU-2016:1750-1 qemu 2016-07-06
SUSE SUSE-SU-2016:1745-1 xen 2016-07-06
SUSE SUSE-SU-2016:1703-1 qemu 2016-06-29
SUSE SUSE-SU-2016:1698-1 kvm 2016-06-28
Fedora FEDORA-2016-e1784417af xen 2016-02-01
CentOS CESA-2016:0082 qemu-kvm 2016-02-01
CentOS CESA-2016:0083 qemu-kvm 2016-02-01
Fedora FEDORA-2016-2c15b72b01 xen 2016-01-28
Scientific Linux SLSA-2016:0083-1 qemu-kvm 2016-01-28
Scientific Linux SLSA-2016:0082-1 qemu-kvm 2016-01-28
Oracle ELSA-2016-0082 qemu-kvm 2016-01-28
Oracle ELSA-2016-0083 qemu-kvm 2016-01-28
Red Hat RHSA-2016:0087-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0088-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0085-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0086-01 qemu-kvm-rhev 2016-01-28
Red Hat RHSA-2016:0083-01 qemu-kvm 2016-01-28
Red Hat RHSA-2016:0082-01 qemu-kvm 2016-01-28
Fedora FEDORA-2016-42778e8c82 qemu 2016-01-24
Mageia MGASA-2016-0023 qemu 2016-01-17
SUSE SUSE-SU-2016:1560-1 qemu 2016-06-13
SUSE SUSE-SU-2016:1445-1 Xen 2016-05-30
SUSE SUSE-SU-2016:1318-1 xen 2016-05-17
Oracle ELSA-2016-0997 qemu-kvm 2016-05-17
SUSE SUSE-SU-2016:1154-1 xen 2016-04-26
openSUSE openSUSE-SU-2016:0995-1 xen 2016-04-08
SUSE SUSE-SU-2016:0955-1 xen 2016-04-05
Gentoo 201604-01 qemu 2016-04-02
openSUSE openSUSE-SU-2016:0914-1 xen 2016-03-30
SUSE SUSE-SU-2016:0873-1 xen 2016-03-24
Fedora FEDORA-2016-38b20aa50f xen 2016-03-19
Fedora FEDORA-2016-f4504e9445 xen 2016-03-20
Fedora FEDORA-2016-be042f7e6f qemu 2016-02-25
Fedora FEDORA-2016-b49aaf2c56 qemu 2016-02-21
Debian DSA-3470-1 qemu-kvm 2016-02-08
Debian DSA-3471-1 qemu 2016-02-08
Debian DSA-3469-1 qemu 2016-02-08
Gentoo 201602-01 qemu 2016-02-04
Ubuntu USN-2891-1 qemu, qemu-kvm 2016-02-03
Fedora FEDORA-2016-275e9ff483 qemu 2016-02-02

Comments (none posted)

radicale: multiple vulnerabilities

Package(s):radicale CVE #(s):CVE-2015-8747 CVE-2015-8748
Created:January 20, 2016 Updated:February 9, 2016
Description: From the Red Hat bugzilla:

Multiple security fixes related mostly to improved input sanitization appeared in release of radicale 1.1:

  • Improve the regex used for well-known URIs
  • Prevent regex injection in rights management
  • Prevent crafted HTTP request from calling arbitrary functions
  • Improve URI sanitation and conversion to filesystem path
  • Decouple the daemon from its parent environment
Alerts:
Debian DSA-3462-1 radicale 2016-01-30
Debian-LTS DLA-403-1 radicale 2016-01-26
Fedora FEDORA-2016-cf9e2429b5 radicale 2016-01-19
Fedora FEDORA-2016-f048c43393 radicale 2016-01-19
Mageia MGASA-2016-0057 radicale 2016-02-09

Comments (none posted)

roundcubemail: code execution

Package(s):roundcubemail CVE #(s):CVE-2015-8770
Created:January 18, 2016 Updated:April 5, 2016
Description: From the Arch Linux advisory:

High-Tech Bridge Security Research Lab discovered a path traversal vulnerability in Roundcube. Vulnerability can be exploited to gain access to sensitive information and under certain circumstances to execute arbitrary code and totally compromise the vulnerable server.

The vulnerability exists due to insufficient sanitization of "_skin" HTTP POST parameter in "/index.php" script when changing between different skins of the web application. A remote authenticated attacker can use path traversal sequences (e.g. "../../") to load a new skin from arbitrary location on the system, readable by the webserver.

Exploitation of the vulnerability requires valid user credentials and ability to create files on vulnerable host.

A remote authenticated attacker can access sensitive information and may be able to execute arbitrary code on the affected host.

Alerts:
openSUSE openSUSE-SU-2016:0214-1 roundcubemail 2016-01-24
openSUSE openSUSE-SU-2016:0210-1 roundcubemail 2016-01-24
openSUSE openSUSE-SU-2016:0213-1 roundcubemail 2016-01-24
Debian-LTS DLA-392-1 roundcube 2016-01-17
Arch Linux ASA-201601-18 roundcubemail 2016-01-17
Debian DSA-3541-1 roundcube 2016-04-05
Gentoo 201603-03 roundcube 2016-03-09

Comments (none posted)

salt: insecure /tmp file handling

Package(s):salt CVE #(s):CVE-2015-1838 CVE-2015-1839
Created:January 18, 2016 Updated:January 20, 2016
Description: From the Red Hat bugzilla:

CVE-2015-1838: Michael Scherer of Red Hat reported an insecure /tmp file handling in salt/modules/serverdensity_device.py in SaltStack. This issue is fixed in SaltStack version 2014.7.4.

CVE-2015-1839: Michael Scherer of Red Hat reported an insecure /tmp file handling in salt/modules/chef.py in SaltStack. This issue is fixed in SaltStack version 2014.7.4.

Alerts:
Fedora FEDORA-2016-105b3b8804 salt 2016-01-15

Comments (none posted)

srtp: denial of service

Package(s):srtp CVE #(s):CVE-2015-6360
Created:January 19, 2016 Updated:September 8, 2016
Description: From the Debian LTS advisory:

Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue.

Alerts:
openSUSE openSUSE-SU-2016:2266-1 libsrtp 2016-09-08
Mageia MGASA-2016-0037 srtp 2016-01-29
Debian-LTS DLA-393-1 srtp 2016-01-18
Debian DSA-3539-1 srtp 2016-04-02

Comments (none posted)

xen: denial of service

Package(s):xen CVE #(s):CVE-2015-8567 CVE-2015-8568
Created:January 15, 2016 Updated:January 20, 2016
Description:

From the openSUSE bug report:

Qemu emulator built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to a memory leakage flaw. It occurs when a guest repeatedly tries to activate the vmxnet3 device.

A privileged guest user could use this flaw to leak host memory, resulting in DoS on the host.

Alerts:
openSUSE openSUSE-SU-2016:2494-1 xen 2016-10-11
openSUSE openSUSE-SU-2016:1750-1 qemu 2016-07-06
SUSE SUSE-SU-2016:1703-1 qemu 2016-06-29
Fedora FEDORA-2016-e1784417af xen 2016-02-01
Fedora FEDORA-2016-2c15b72b01 xen 2016-01-28
Fedora FEDORA-2016-42778e8c82 qemu 2016-01-24
Mageia MGASA-2016-0023 qemu 2016-01-17
openSUSE openSUSE-SU-2016:0126-1 xen 2016-01-14
openSUSE openSUSE-SU-2016:0123-1 xen 2016-01-14
SUSE SUSE-SU-2016:1560-1 qemu 2016-06-13
SUSE SUSE-SU-2016:1318-1 xen 2016-05-17
SUSE SUSE-SU-2016:0955-1 xen 2016-04-05
SUSE SUSE-SU-2016:0873-1 xen 2016-03-24
Debian DSA-3471-1 qemu 2016-02-08
Gentoo 201602-01 qemu 2016-02-04
Ubuntu USN-2891-1 qemu, qemu-kvm 2016-02-03
Fedora FEDORA-2016-275e9ff483 qemu 2016-02-02

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds