|
|
Subscribe / Log in / New account

Security

Shifting feature sets and search engines in Tor Browser 6

By Nathan Willis
June 2, 2016

The Tor project has released version 6.0 of Tor Browser. As usual, the new release brings Tor Browser's feature set up to date with the most recent Extended Support Release (ESR) version of Firefox (on which Tor Browser is based) and adds some new privacy features. But 6.0 also makes some changes that users may want to be aware of. It drops Disconnect as the default search engine and it disables several recent Firefox features—including the privacy-focused Tracking Protection feature. Those changes might sound like regressions on the privacy front, but they were mandated by the ever-shifting landscape of web services.

Tor Browser 6.0 is based on Firefox 45 ESR, which was released in March 2016. The Tor Browser announcement notes that the update should improve the performance of HTML5 video playback. There are, of course, many other improvements bundled into the updated Firefox—some of which cause problems for Tor Browser users, rather than enhancing their web-browsing experience.

Consequently, several recently added Firefox features have been disabled in Tor Browser 6.0. The user-visible deletions include high-profile features like Mozilla's Shumway runtime for Flash content, the Firefox integration for the Pocket bookmark-sharing service, and the feedback and "health report" services that relay browser information back to Mozilla. In each of these instances, the privacy risk is easy to discern: Flash content can run arbitrary code, which makes it a risk regardless of whether Adobe's binary Flash plugin or Mozilla's Shumway executes it, and the other services all send browser information to remote servers.

There are also several less-visible features disabled in the new Tor Browser release. Multicast DNS support through libmdns, which could disclose the browser's location to other computers on the local network, has been disabled, as has the "Network Tickler" feature that was used in Firefox for Android to keep WiFi connections from timing out.

Several new vectors for browser fingerprinting and user tracking have also been found and disabled. They include support for the HTTP Alternative Services header (which can be exploited by supercookies), support for the mediaDevices.enumerateDevices method, and support for some WebGL methods known to be useful for fingerprinting. There have also been some changes to further guard against fingerprinting; for example, Tor Browser now spoofs the screen.orientation property.

Some of these features were first implemented in earlier Firefox releases but left disabled by default, then enabled in a subsequent Firefox update. The response from the Tor Browser developers typifies the process that they must engage in to keep on top of the constantly evolving set of APIs available in Firefox. Similarly, there are also some recent feature additions that Tor Browser has disabled even though it is not yet clear whether they constitute a security or privacy risk. One example is the mozTCPSocket API, which is meant to be used only by privileged processes to open TCP sockets.

Although the API is not known to pose a security risk, Tor Browser 6.0 disables it, pending a fuller security audit. Also disabled for the time being are the Reader View feature, the Push API (which is meant to be exposed only to Service Workers), and the <link rel=preconnect> resource hint, which is used to tell the browser to initiate an HTTP pre-connection for a soon-to-be-requested URI. The pre-connection includes a DNS lookup, TCP handshake, and (if needed) a TLS negotiation. Is it possible that this feature, like the others, will be re-enabled in a future Tor Browser release.

A potentially puzzling move, however, is that Tor Browser 6.0 disables Firefox Tracking Protection, a feature designed to safeguard user privacy by intercepting and blocking HTTP requests sent to domains listed on a secret blacklist curated by Mozilla. As it turns out, it is the blacklist that causes the trouble. In a comment on the bug report, Tor's George Kadianakis noted two objections. One is that Mozilla exempts certain known web trackers from the blacklist because blocking them would break the functionality of too many popular web sites. The other is described in a paper [PDF] (note: SSL certificate warning) Kadianakis linked to, which describes a method that tracking services could use to bypass the blacklist. The technique uses Apache's AliasMatch directive to serve the blacklisted content through several (or, indeed, a great many) customizable URLs.

Those objections may smack of "the perfect is the enemy of the good" to some users; after all, imperfect blacklisting is surely superior to no blacklisting at all. But "cypherpunks" indicated yet another problem: the presence of the blacklist can be used to fingerprint the browser. Ultimately, the site-breakage issue seems to be the one that made the decision final, but it would not be surprising if a significant number users find the lack of Tracking Protection to be a questionable choice.

Another change that may concern Tor Browser users is that the 6.0 release no longer uses Disconnect as the default search engine. Disconnect is a meta-search engine that anonymizes search requests by relaying the search terms to other search engines, then sanitizing the results that it returns to the user (removing, for example, web-tracking measures). But, in recent months, Disconnect searches have evidently been blocked by Google, so the service has been falling back to the Bing search engine. And, as the Tor Browser 6.0 release announcement puts it, the results returned "were basically unacceptable quality-wise." Consequently, Tor Browser now uses DuckDuckGo as its default search engine, while the Disconnect team is working to resolve its issues with Google.

There are several other interesting new features to be found in Tor Browser 6.0, including a keyboard shortcut to trigger the initialization of a new Tor circuit and one to clear all browser state, close all tabs, and initiate a new Tor circuit (a feature labeled "New Identity" in the Tor Browser interface). The browser has also dropped support for SHA-1 hashes on SSL certificates and has disabled the local logging of TLS/SSL key material. OS X builds are now signed; implementing this feature required changing the internal layout of the Mac application bundle.

Furthermore, Mozilla recently disabled hash checking for Firefox's update.xml file (which the browser fetches to see if a new release has been published and, if so, to get the new release's URL). Tor Browser has re-enabled that hash check, allowing it to verify that the update file has not been tampered with. Finally, Mozilla has now made signatures mandatory on browser extensions. Tor Browser disables the signature-checking feature for its own set of pre-installed extensions (such as HTTPS Everywhere).

Tor Browser is undoubtedly a project that many web users find valuable at least some portion of the time, even if they do not use it for all of their daily browsing. But it is interesting to observe how the project can find itself in the middle of a three-way arms race, with its developers doing their best to keep up not just with the site owners and service providers who are constantly finding new ways to violate the anonymity of users, but with Firefox as well, as Mozilla implements new features and changes browser behavior with every release—not always in ways that enhance user privacy.

Comments (4 posted)

Brief items

Security quotes of the week

Yes, UNIX is pretty much a swiss cheese: it's really hard to secure a system properly so that somebody who once had access won't have access anymore at a later point. However, we need to start somewhere, and actually defining a clear lifecycle is a good start.

Pretty much all more modern OS designs tend to have such a clear lifecycle btw: when the user is logged out, he's *really* logged out. And it's completely OK if certain users get [excluded] from that, but if so, then the admin needs to sign off on that, and thus a privilege check needs to be enforced.

Lennart Poettering

It's true in cryptography, where we can never say that an algorithm is secure. We can either show how it's insecure, or say something like: all of these smart people have spent lots of hours trying to break it, and they can't -- but we don't know what a smarter person who spends even more hours analyzing it will come up with. It's true in things like airport security, where we can easily point out insecurities but are unable to similarly demonstrate that some measures are unnecessary. And this does lead to a ratcheting up on security, in the absence of constraints like budget or processing speed. It's easier to demand that everyone take off their shoes for special screening, or that we add another four rounds to the cipher, than to argue the reverse.

But it's not entirely true. It's difficult, but we can analyze the cost-effectiveness of different security measures. We can compare them with each other. We can make estimations and decisions and optimizations. It's just not easy, and often it's more of an art than a science. But all is not lost.

Bruce Schneier on a paper [PDF] titled "Unfalsifiability of security claims"

Comments (73 posted)

Analog malicious hardware

Worth a read: this paper [PDF] From Kaiyuan Yang et al. on how an analog back door can be placed into a hardware platform like a CPU. "In this paper, we show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small (i.e., requires as little as one gate) and stealthy (i.e., requires an unlikely trigger sequence before effecting [sic] a chip’s functionality). In the open spaces of an already placed and routed design, we construct a circuit that uses capacitors to siphon charge from nearby wires as they transition between digital values. When the capacitors fully charge, they deploy an attack that forces a victim flip-flop to a desired value. We weaponize this attack into a remotely-controllable privilege escalation by attaching the capacitor to a wire controllable and by selecting a victim flip-flop that holds the privilege bit for our processor."

Comments (7 posted)

Hertz: Abusing privileged and unprivileged Linux containers

This white paper by Jesse Hertz [PDF] examines various ways to compromise and escape from containers on Linux systems. "A common configuration for companies offering PaaS solutions built on containers is to have multiple customers’ containers running on the same physical host. By default, both LXC and Docker setup container networking so that all containers share the same Linux virtual bridge. These containers will be able to communicate with each other. Even if this direct network access is disabled (using the –icc=false flag for Docker, or using iptables rules for LXC), containers aren’t restricted for link-layer traffic. In particular, it is possible (and in fact quite easy) to conduct an ARP spoofing attack on another container within the same host system, allowing full middle-person attacks of the targeted container’s traffic."

Comments (8 posted)

New vulnerabilities

bozohttpd: two vulnerabilities

Package(s):bozohttpd CVE #(s):CVE-2014-5015 CVE-2015-8212
Created:May 26, 2016 Updated:June 2, 2016
Description: From the Debian-LTS advisory:

CVE-2014-5015: Bozotic HTTP server (aka bozohttpd) before 201407081 truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.

CVE-2015-8212: A flaw in CGI suffix handler support was found, if the -C option has been used to setup a CGI handler, that could result in remote code execution.

Alerts:
Debian-LTS DLA-490-1 bozohttpd 2016-05-26

Comments (none posted)

chromium: multiple vulnerabilities

Package(s):chromium CVE #(s):CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695
Created:May 31, 2016 Updated:July 18, 2016
Description: From the Arch Linux advisory:

- CVE-2016-1672: Cross-origin bypass in extension bindings. Credit to Mariusz Mlynski.

- CVE-2016-1673: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.

- CVE-2016-1674: Cross-origin bypass in extensions. Credit to Mariusz Mlynski.

- CVE-2016-1675: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.

- CVE-2016-1676: Cross-origin bypass in extension bindings. Credit to Rob Wu.

- CVE-2016-1677: Type confusion in V8. Credit to Guang Gong of Qihoo 360.

- CVE-2016-1678: Heap overflow in V8. Credit to Christian Holler.

- CVE-2016-1679: Heap use-after-free in V8 bindings. Credit to Rob Wu.

- CVE-2016-1680: Heap use-after-free in Skia. Credit to Atte Kettunen of OUSPG.

- CVE-2016-1681: Heap overflow in PDFium. Credit to Aleksandar Nikolic of Cisco Talos.

- CVE-2016-1682: CSP bypass for ServiceWorker. Credit to KingstonTime.

- CVE-2016-1683: Out-of-bounds access in libxslt. Credit to Nicolas Gregoire.

- CVE-2016-1684: Integer overflow in libxslt. Credit to Nicolas Gregoire.

- CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB.

- CVE-2016-1686: Out-of-bounds read in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB.

- CVE-2016-1687: Information leak in extensions. Credit to Rob Wu.

- CVE-2016-1688: Out-of-bounds read in V8. Credit to Max Korenko.

- CVE-2016-1689: Heap buffer overflow in media. Credit to Atte Kettunen of OUSPG.

- CVE-2016-1690: Heap use-after-free in Autofill. Credit to Rob Wu.

- CVE-2016-1691: Heap buffer-overflow in Skia. Credit to Atte Kettunen of OUSPG.

- CVE-2016-1692: Limited cross-origin bypass in ServiceWorker. Credit to Til Jasper Ullrich.

- CVE-2016-1693: HTTP Download of Software Removal Tool. Credit to Khalil Zhani.

- CVE-2016-1694: HPKP pins removed on cache clearance. Credit to Ryan Lester and Bryant Zadegan.

- CVE-2016-1695: Various fixes from internal audits, fuzzing and other initiatives.

Alerts:
Gentoo 201607-07 chromium 2016-07-16
Debian DSA-3605-1 libxslt 2016-06-19
Debian-LTS DLA-514-1 libxslt 2016-06-12
Mageia MGASA-2016-0217 libxslt 2016-06-07
Ubuntu USN-2992-1 oxide-qt 2016-06-06
openSUSE openSUSE-SU-2016:1496-1 Chromium 2016-06-05
Mageia MGASA-2016-0214 chromium-browser-stable 2016-06-02
Debian DSA-3590-1 chromium-browser 2016-06-01
Red Hat RHSA-2016:1190-01 chromium-browser 2016-06-01
openSUSE openSUSE-SU-2016:1430-1 Chromium 2016-05-28
openSUSE openSUSE-SU-2016:1433-1 Chromium 2016-05-28
Arch Linux ASA-201605-28 chromium 2016-05-28

Comments (none posted)

gd: information leak

Package(s):gd CVE #(s):CVE-2016-5116
Created:June 2, 2016 Updated:June 8, 2016
Description: From the Red Hat bugzilla:

While creating an XBM image (imagexbm) with an user supplied name, libgd isn't checking the vsnprintf return value and PHP 5.5 will trust this length and read more memory than it should, causing a read-out-of boundaries, leaking stack memory.

Alerts:
openSUSE openSUSE-SU-2016:2363-1 gd 2016-09-24
Debian DSA-3619-1 libgd2 2016-07-15
Ubuntu USN-3030-1 libgd2 2016-07-11
openSUSE openSUSE-SU-2016:1516-1 gd 2016-06-07
Mageia MGASA-2016-0215 libgd 2016-06-02
Fedora FEDORA-2016-de6e26b8aa gd 2016-06-02

Comments (none posted)

glibc: privilege escalation

Package(s):eglibc, glibc CVE #(s):CVE-2016-2856
Created:May 26, 2016 Updated:June 2, 2016
Description: From the Ubuntu advisory:

Martin Carpenter discovered that pt_chown in the GNU C Library did not properly check permissions for tty files. A local attacker could use this to gain administrative privileges or expose sensitive information. (CVE-2013-2207, CVE-2016-2856)

Alerts:
Ubuntu USN-2985-2 eglibc, glibc 2016-05-26
Ubuntu USN-2985-1 eglibc, glibc 2016-05-25

Comments (none posted)

imagemagick: command execution

Package(s):imagemagick graphicsmagick CVE #(s):CVE-2016-5118
Created:May 31, 2016 Updated:June 22, 2016
Description: From the Slackware advisory:

Removed popen() support to prevent another shell vulnerability. This issue was discovered by Bob Friesenhahn, of the GraphicsMagick project.

From the Debian advisory:

Bob Friesenhahn from the GraphicsMagick project discovered a command injection vulnerability in ImageMagick, a program suite for image manipulation. An attacker with control on input image or the input filename can execute arbitrary commands with the privileges of the user running the application.

Alerts:
Mageia MGASA-2016-0257 imagemagick 2016-07-19
Mageia MGASA-2016-0252 graphicsmagick 2016-07-14
openSUSE openSUSE-SU-2016:1653-1 ImageMagick 2016-06-22
Scientific Linux SLSA-2016:1237-1 ImageMagick 2016-06-17
Fedora FEDORA-2016-40ccaff4d1 GraphicsMagick 2016-06-19
Fedora FEDORA-2016-7a878ed298 GraphicsMagick 2016-06-19
Oracle ELSA-2016-1237 ImageMagick 2016-06-16
SUSE SUSE-SU-2016:1610-1 ImageMagick 2016-06-17
Red Hat RHSA-2016:1237-01 imagemagick 2016-06-16
CentOS CESA-2016:1237 imagemagick 2016-06-16
CentOS CESA-2016:1237 imagemagick 2016-06-16
SUSE SUSE-SU-2016:1570-1 ImageMagick 2016-06-14
openSUSE openSUSE-SU-2016:1534-1 ImageMagick 2016-06-09
openSUSE openSUSE-SU-2016:1522-1 GraphicsMagick 2016-06-08
openSUSE openSUSE-SU-2016:1521-1 GraphicsMagick 2016-06-08
Ubuntu USN-2990-1 imagemagick 2016-06-02
Debian-LTS DLA-500-1 imagemagick 2016-06-02
Debian-LTS DLA-502-1 graphicsmagick 2016-06-02
Debian DSA-3591-1 imagemagick 2016-06-01
Slackware SSA:2016-152-01 imagemagick 2016-05-30
Debian DSA-3746-1 graphicsmagick 2016-12-24
openSUSE openSUSE-SU-2016:3060-1 GraphicsMagick 2016-12-08

Comments (none posted)

jenkins: multiple vulnerabilities

Package(s):jenkins CVE #(s):CVE-2016-3721 CVE-2016-3722 CVE-2016-3723 CVE-2016-3724 CVE-2016-3725 CVE-2016-3726 CVE-2016-3727
Created:May 27, 2016 Updated:June 7, 2016
Description:

From the Fedora advisory:

CVE-2016-3721: Arbitrary build parameters are passed to build scripts as environment variables.

CVE-2016-3722: Malicious users with multiple user accounts can prevent other users from logging in.

CVE-2016-3723: Information on installed plugins exposed via API.

CVE-2016-3724: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration.

CVE-2016-3725: Regular users can trigger download of update site metadata.

CVE-2016-3726: Open redirect to scheme-relative URLs.

CVE-2016-3727: Granting the permission to read node configurations allows access to overall system configuration.

Alerts:
Red Hat RHSA-2016:1773-01 Red Hat OpenShift Enterprise 2.2.10 2016-08-24
Red Hat RHSA-2016:1206-01 jenkins 2016-06-06
Fedora FEDORA-2016-f7e7a6067d jenkins 2016-05-26
Fedora FEDORA-2016-9ba53cf8a2 jenkins 2016-05-26

Comments (none posted)

kernel: information disclosure

Package(s):kernel CVE #(s):CVE-2016-2117
Created:June 1, 2016 Updated:August 2, 2016
Description: From the CVE entry:

The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.

Alerts:
Oracle ELSA-2016-2574 kernel 2016-11-10
Red Hat RHSA-2016:2584-02 kernel-rt 2016-11-03
Red Hat RHSA-2016:2574-02 kernel 2016-11-03
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
Oracle ELSA-2016-3589 kernel 2.6.39 2016-08-01
Oracle ELSA-2016-3589 kernel 2.6.39 2016-08-01
Oracle ELSA-2016-3587 kernel-uek 2016-07-29
Oracle ELSA-2016-3587 kernel-uek 2016-07-29
Oracle ELSA-2016-3588 kernel 3.8.13 2016-07-29
Oracle ELSA-2016-3588 kernel 3.8.13 2016-07-29
Debian DSA-3607-1 kernel 2016-06-28
Mageia MGASA-2016-0233 kernel-tmb 2016-06-22
Mageia MGASA-2016-0232 kernel-linus 2016-06-22
Mageia MGASA-2016-0225 kernel 2016-06-13
Ubuntu USN-3004-1 linux-raspi2 2016-06-09
Ubuntu USN-3007-1 linux-raspi2 2016-06-10
Ubuntu USN-3005-1 linux-lts-xenial 2016-06-10
Ubuntu USN-3002-1 linux-lts-wily 2016-06-09
Ubuntu USN-3001-1 linux-lts-vivid 2016-06-09
Ubuntu USN-3000-1 linux-lts-utopic 2016-06-09
Ubuntu USN-2998-1 linux-lts-trusty 2016-06-09
Ubuntu USN-3003-1 kernel 2016-06-09
Ubuntu USN-3006-1 kernel 2016-06-10
Ubuntu USN-2989-1 kernel 2016-05-31
Scientific Linux SLSA-2016:2574-2 kernel 2016-12-14

Comments (none posted)

kernel: two vulnerabilities

Package(s):kernel CVE #(s):CVE-2016-4913 CVE-2016-4440
Created:June 2, 2016 Updated:June 2, 2016
Description: From the CVE entry:

The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem. (CVE-2016-4913)

From the Red Hat bugzilla:

Linux kernel built with the Kernel-based virtual machine(CONFIG_KVM) along with Hyper-v Synthetic Interrupt Controller(SynIC) support is vulnerable to an undue APIC register access issue. In that a guest with SynIC enabled, could gain access to host's Machine Specific Registers(MSR).

A privileged user inside guest could use this flaw to crash the host kernel resulting in DoS OR potentially leverage it to escalate privileges on the host. (CVE-2016-4440)

Alerts:
SUSE SUSE-SU-2016:2245-1 kernel 2016-09-06
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
openSUSE openSUSE-SU-2016:2144-1 kernel 2016-08-24
SUSE SUSE-SU-2016:1985-1 kernel 2016-08-08
SUSE SUSE-SU-2017:0333-1 kernel 2017-01-30
Ubuntu USN-3021-2 linux-ti-omap4 2016-06-27
Ubuntu USN-3016-3 linux-snapdragon 2016-06-27
Ubuntu USN-3017-2 linux-raspi2 2016-06-27
Ubuntu USN-3016-2 linux-raspi2 2016-06-27
Ubuntu USN-3016-4 linux-lts-xenial 2016-06-27
Ubuntu USN-3017-3 linux-lts-wily 2016-06-27
Ubuntu USN-3020-1 linux-lts-vivid 2016-06-27
Ubuntu USN-3019-1 linux-lts-utopic 2016-06-27
Ubuntu USN-3018-2 linux-lts-trusty 2016-06-27
Ubuntu USN-3021-1 kernel 2016-06-27
Ubuntu USN-3018-1 kernel 2016-06-27
Ubuntu USN-3017-1 kernel 2016-06-27
Ubuntu USN-3016-1 kernel 2016-06-27
Debian DSA-3607-1 kernel 2016-06-28
SUSE SUSE-SU-2016:1672-1 the Linux Kernel 2016-06-24
Debian-LTS DLA-516-1 kernel 2016-06-17
Fedora FEDORA-2016-2363b37a98 kernel 2016-06-01
Fedora FEDORA-2016-06f1572324 kernel 2016-06-02

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2016-4951
Created:June 2, 2016 Updated:June 9, 2016
Description: From the CVE entry:

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

Alerts:
openSUSE openSUSE-SU-2016:2290-1 kernel 2016-09-12
Mageia MGASA-2016-0283 kernel-tmb 2016-08-31
Mageia MGASA-2016-0284 kernel-linus 2016-08-31
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
Oracle ELSA-2016-3596 kernel 4.1.12 2016-08-26
Mageia MGASA-2016-0271 kernel 2016-07-31
Ubuntu USN-3016-3 linux-snapdragon 2016-06-27
Ubuntu USN-3017-2 linux-raspi2 2016-06-27
Ubuntu USN-3016-2 linux-raspi2 2016-06-27
Ubuntu USN-3016-4 linux-lts-xenial 2016-06-27
Ubuntu USN-3017-3 linux-lts-wily 2016-06-27
Ubuntu USN-3020-1 linux-lts-vivid 2016-06-27
Ubuntu USN-3017-1 kernel 2016-06-27
Ubuntu USN-3016-1 kernel 2016-06-27
openSUSE openSUSE-SU-2016:1641-1 kernel 2016-06-21
Fedora FEDORA-2016-c1faf6005c kernel 2016-06-08
Fedora FEDORA-2016-2363b37a98 kernel 2016-06-01

Comments (none posted)

kf5-kinit: privilege escalation

Package(s):kf5-kinit CVE #(s):CVE-2016-3100
Created:May 31, 2016 Updated:July 6, 2016
Description: From the Fedora advisory:

Followup xauth (security-related) permissions fix, less racy. See also http://bugs.kde.org/358593.

From the openSUSE bug report:

It was found that kdeinit5 creates /tmp/xauth-xxx-_y with inappropriate permission, which are 644 instead of 600. This can be exploited by stealing X11 cookie and running X11 keylogger. Malicious user is able to read key strokes of a different user which might be a sudo user. If attacker can log key events of a sudo user then it can lead to local privilege escalation.

https://bugs.kde.org/show_bug.cgi?id=358593

https://bugs.kde.org/show_bug.cgi?id=363140

Alerts:
openSUSE openSUSE-SU-2016:1723-1 kinit 2016-07-01
Fedora FEDORA-2016-48174dc7f3 kf5-kinit 2016-05-28

Comments (none posted)

libfpx: denial of service

Package(s):libfpx CVE #(s):CVE-2012-0025
Created:May 31, 2016 Updated:June 2, 2016
Description: From the CVE entry:

Double free vulnerability in the Free_All_Memory function in jpeg/dectile.c in libfpx before 1.3.1-1, as used in the FlashPix PlugIn 4.2.2.0 for IrfanView, allows remote attackers to cause a denial of service (crash) via a crafted FPX image.

Alerts:
Gentoo 201605-03 libfpx 2016-05-30

Comments (none posted)

libgd2: denial of service

Package(s):libgd2 CVE #(s):CVE-2015-8877
Created:May 27, 2016 Updated:June 2, 2016
Description:

From the CVE entry:

The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function. ( CVE-2015-8877)

Alerts:
Red Hat RHSA-2016:2750-01 rh-php56 2016-11-15
openSUSE openSUSE-SU-2016:1688-1 php5 2016-06-27
openSUSE openSUSE-SU-2016:1553-1 php5 2016-06-11
Mageia MGASA-2016-0215 libgd 2016-06-02
Fedora FEDORA-2016-de6e26b8aa gd 2016-06-02
Ubuntu USN-2987-1 libgd2 2016-05-31
Slackware SSA:2016-148-03 php 2016-05-27
Debian DSA-3587-1 libgd2 2016-05-27

Comments (none posted)

libimobiledevice: sockets listening on INADDR_ANY

Package(s):libimobiledevice libusbmuxd CVE #(s):CVE-2016-5104
Created:May 31, 2016 Updated:January 30, 2017
Description: From the Red Hat bugzilla:

It was found that libimobiledevice and libusbmuxd libraries accidentally bound a listening IPv4 TCP socket to INADDR_ANY instead of INADDR_LOOPBACK.

Alerts:
Arch Linux ASA-201701-34 libimobiledevice 2017-01-27
Ubuntu USN-3026-2 libusbmuxd 2016-07-05
Ubuntu USN-3026-1 libimobiledevice 2016-07-05
Mageia MGASA-2016-0229 libimobiledevice 2016-06-22
SUSE SUSE-SU-2016:1639-1 libimobiledevice, usbmuxd 2016-06-21
openSUSE openSUSE-SU-2016:1526-1 libimobiledevice, libusbmuxd 2016-06-08
Fedora FEDORA-2016-80078b50d7 libusbmuxd 2016-06-01
Fedora FEDORA-2016-80078b50d7 libimobiledevice 2016-06-01
Fedora FEDORA-2016-c1df5311c4 libusbmuxd 2016-05-31
Fedora FEDORA-2016-c1df5311c4 libimobiledevice 2016-05-31

Comments (none posted)

libxml2: multiple vulnerabilities

Package(s):libxml2 CVE #(s):CVE-2016-1762 CVE-2016-1833 CVE-2016-1834 CVE-2016-1835 CVE-2016-1836 CVE-2016-1837 CVE-2016-1838 CVE-2016-1839 CVE-2016-1840 CVE-2016-4483
Created:May 27, 2016 Updated:June 2, 2016
Description:

From the Arch Linux advisory:

CVE-2016-1762 (denial of service) A vulnerability has been discovered that allows remote attackers to cause a denial of service (memory corruption) via a crafted XML document.

CVE-2016-1833 (denial of service) A maliciously crafted file could cause the application to crash due to a heap-based out-of-bounds memory read.

CVE-2016-1834 (arbitrary code execution) It has been discovered that a heap-buffer-overflow could happen in xmlStrncat.

CVE-2016-1835 (arbitrary code execution) It has been discovered that a maliciously crafted file could cause the application to crash due to a heap use-after-free in xmlSAX2AttributeNs.

CVE-2016-1836 (arbitrary code execution) It has been discovered that a heap-use-after free can happen in the xmlDictComputeFastKey.

CVE-2016-1837 (arbitrary code execution) It has been discovered that a maliciously crafted file could cause the application to crash due to a Heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral.

CVE-2016-1838 (denial of service) It has been discovered that a heap-based buffer overread could happen in xmlParserPrintFileContextInternal

CVE-2016-1839 (denial of service) It has been discovered that a heap-based buffer overread could happen in xmlDictAddString.

CVE-2016-1840 (arbitrary code execution) It has been discovered that a heap-buffer overflow could happen in xmlFAParsePosCharGroup

CVE-2016-4483 (denial of service) It has been discovered that parsing a maliciously crafted XML file could cause the application to crash if recover mode is used.

Alerts:
Mageia MGASA-2016-0263 libxml2 2016-07-26
Scientific Linux SLSA-2016:1292-1 libxml2 2016-06-23
Oracle ELSA-2016-1292 libxml2 2016-06-23
Oracle ELSA-2016-1292 libxml2 2016-06-23
CentOS CESA-2016:1292 libxml2 2016-06-23
CentOS CESA-2016:1292 libxml2 2016-06-23
Red Hat RHSA-2016:1292-01 libxml2 2016-06-23
Gentoo 201701-37 libxml2 2017-01-16
SUSE SUSE-SU-2016:1604-1 libxml2 2016-06-17
openSUSE openSUSE-SU-2016:1594-1 libxml2 2016-06-16
openSUSE openSUSE-SU-2016:1595-1 libxml2 2016-06-16
SUSE SUSE-SU-2016:1538-1 libxml2 2016-06-09
Ubuntu USN-2994-1 libxml2 2016-06-06
Debian-LTS DLA-503-1 libxml2 2016-06-03
Debian DSA-3593-1 libxml2 2016-06-02
Arch Linux ASA-201605-27 libxml2 2016-05-26

Comments (none posted)

libxml2: three vulnerabilities

Package(s):libxml2 CVE #(s):CVE-2016-4447 CVE-2016-4448 CVE-2016-4449
Created:May 31, 2016 Updated:June 2, 2016
Description: From the Slackware advisory:

Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).

Format string vulnerability (CVE-2016-4448).

Inappropriate fetch of entities content (CVE-2016-4449).

Alerts:
Mageia MGASA-2016-0263 libxml2 2016-07-26
Scientific Linux SLSA-2016:1292-1 libxml2 2016-06-23
Oracle ELSA-2016-1292 libxml2 2016-06-23
Oracle ELSA-2016-1292 libxml2 2016-06-23
CentOS CESA-2016:1292 libxml2 2016-06-23
CentOS CESA-2016:1292 libxml2 2016-06-23
Red Hat RHSA-2016:1292-01 libxml2 2016-06-23
SUSE SUSE-SU-2016:1604-1 libxml2 2016-06-17
openSUSE openSUSE-SU-2016:1595-1 libxml2 2016-06-16
SUSE SUSE-SU-2016:1538-1 libxml2 2016-06-09
Ubuntu USN-2994-1 libxml2 2016-06-06
Debian-LTS DLA-503-1 libxml2 2016-06-03
Debian DSA-3593-1 libxml2 2016-06-02
Slackware SSA:2016-148-01 libxml2 2016-05-27

Comments (none posted)

lxd: two vulnerabilities

Package(s):lxd CVE #(s):CVE-2016-1581 CVE-2016-1582
Created:June 1, 2016 Updated:June 2, 2016
Description: From the Ubuntu advisory:

Robie Basak discovered that LXD incorrectly set permissions when setting up a loop based ZFS pool. A local attacker could use this issue to copy and read the data of any LXD container. (CVE-2016-1581)

Robie Basak discovered that LXD incorrectly set permissions when switching an unprivileged container into privileged mode. A local attacker could use this issue to access any world readable path in the container directory, including setuid binaries. (CVE-2016-1582)

Alerts:
Ubuntu USN-2988-1 lxd 2016-05-31

Comments (none posted)

mediawiki: multiple vulnerabilities

Package(s):mediawiki CVE #(s):
Created:May 31, 2016 Updated:July 5, 2016
Description: From the Mageia advisory:

The mediawiki package has been updated to version 1.23.14, which fixes multiple security issues and other bugs. See the release announcements for more details.

https://lists.wikimedia.org/pipermail/mediawiki-announce/...

https://lists.wikimedia.org/pipermail/mediawiki-announce/...

Alerts:
Fedora FEDORA-2016-3093027736 mediawiki 2016-07-02
Fedora FEDORA-2016-98dd843ebb mediawiki 2016-07-02
Mageia MGASA-2016-0210 mediawiki 2016-05-29

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):nss firefox CVE #(s):CVE-2015-2714 CVE-2016-1940 CVE-2016-1941 CVE-2016-1943 CVE-2016-1948 CVE-2016-1969
Created:May 31, 2016 Updated:June 2, 2016
Description: From the CVE entries:

Mozilla Firefox before 38.0 on Android does not properly restrict writing URL data to the Android logging system, which allows attackers to obtain sensitive information via a crafted application that has a required permission for reading a log, as demonstrated by the READ_LOGS permission for the mixed-content violation log on Android 4.0 and earlier. (CVE-2015-2714)

Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via a data: URL that is mishandled during (1) shortcut opening or (2) BOOKMARK intent processing. (CVE-2016-1940)

The file-download dialog in Mozilla Firefox before 44.0 on OS X enables a certain button too quickly, which allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended. (CVE-2016-1941)

Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via the scrollTo method. (CVE-2016-1943)

Mozilla Firefox before 44.0 on Android does not ensure that HTTPS is used for a lightweight-theme installation, which allows man-in-the-middle attackers to replace a theme's images and colors by modifying the client-server data stream. (CVE-2016-1948)

The setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.6.1, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted Graphite smart font. (CVE-2016-1969)

Alerts:
Slackware SSA:2016-152-02 thunderbird 2016-05-30
Gentoo 201605-06 nss 2016-05-31

Comments (none posted)

nginx: denial of service

Package(s):nginx CVE #(s):CVE-2016-4450
Created:June 2, 2016 Updated:February 2, 2017
Description: From the Arch Linux advisory:

A vulnerability was found in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while handling the client request body.

A remote attacker is able to use a specially crafted request to crash the worker resulting in denial of service.

Alerts:
openSUSE openSUSE-SU-2017:0361-1 nginx 2017-02-02
openSUSE openSUSE-SU-2017:0362-1 nginx 2017-02-02
Red Hat RHSA-2016:1425-01 rh-nginx18-nginx 2016-07-14
Gentoo 201606-06 nginx 2016-06-17
Fedora FEDORA-2016-ea323bd6cf nginx 2016-06-07
Ubuntu USN-2991-1 nginx 2016-06-02
Mageia MGASA-2016-0216 nginx 2016-06-02
Debian DSA-3592-1 nginx 2016-06-01
Arch Linux ASA-201606-2 nginx-mainline 2016-06-01
Arch Linux ASA-201606-1 nginx 2016-06-01

Comments (none posted)

openafs: denial of service

Package(s):openafs CVE #(s):CVE-2015-8312
Created:May 31, 2016 Updated:June 2, 2016
Description: From the CVE entry:

Off-by-one error in afs_pioctl.c in OpenAFS before 1.6.16 might allow local users to cause a denial of service (memory overwrite and system crash) via a pioctl with an input buffer size of 4096 bytes.

Alerts:
Debian-LTS DLA-493-1 openafs 2016-05-29

Comments (none posted)

pdns: insecure database permissions

Package(s):pdns CVE #(s):CVE-2014-7210
Created:May 31, 2016 Updated:June 2, 2016
Description: From the Debian LTS advisory:

It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends are not affected.

Alerts:
Debian-LTS DLA-492-1 pdns 2016-05-29

Comments (none posted)

php: integer overflow

Package(s):php CVE #(s):CVE-2016-5094
Created:May 31, 2016 Updated:June 2, 2016
Description: From the PHP changelog:

Fixed bug #72135 (Integer Overflow in php_html_entities). (CVE-2016-5094)

Alerts:
Red Hat RHSA-2016:2750-01 rh-php56 2016-11-15
Ubuntu USN-3045-1 php5, php7.0 2016-08-02
Debian-LTS DLA-533-1 php5 2016-06-29
openSUSE openSUSE-SU-2016:1688-1 php5 2016-06-27
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
SUSE SUSE-SU-2016:1581-1 php53 2016-06-14
Debian DSA-3602-1 php5 2016-06-14
openSUSE openSUSE-SU-2016:1553-1 php5 2016-06-11
Fedora FEDORA-2016-65f1ffdc0c php 2016-06-03
Mageia MGASA-2016-0213 php 2016-06-02
Slackware SSA:2016-148-03 php 2016-05-27

Comments (none posted)

php: two vulnerabilities

Package(s):php CVE #(s):CVE-2016-5096 CVE-2016-5093
Created:May 31, 2016 Updated:June 2, 2016
Description: From the Red Hat bugzilla:

An integer underflow resulting into arbitrary null character write in fread/gzread function was found. (CVE-2016-5096)

An out-of-bounds read vulnerability was found in get_icu_value_internal causes leakage of heap memory because of missing null character at the end of zend_string. (CVE-2016-5093)

Alerts:
Red Hat RHSA-2016:2750-01 rh-php56 2016-11-15
Debian-LTS DLA-628-1 php5 2016-09-18
Ubuntu USN-3045-1 php5, php7.0 2016-08-02
Debian-LTS DLA-533-1 php5 2016-06-29
openSUSE openSUSE-SU-2016:1688-1 php5 2016-06-27
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
SUSE SUSE-SU-2016:1581-1 php53 2016-06-14
Debian DSA-3602-1 php5 2016-06-14
openSUSE openSUSE-SU-2016:1553-1 php5 2016-06-11
Fedora FEDORA-2016-65f1ffdc0c php 2016-06-03
Mageia MGASA-2016-0213 php 2016-06-02
Slackware SSA:2016-148-03 php 2016-05-27
Fedora FEDORA-2016-6b1938566f php 2016-05-29

Comments (none posted)

php: two vulnerabilities

Package(s):php5 CVE #(s):CVE-2015-8878 CVE-2015-8879
Created:June 1, 2016 Updated:June 2, 2016
Description: From the CVE entries:

main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before 5.6.12 does not ensure thread safety, which allows remote attackers to cause a denial of service (race condition and heap memory corruption) by leveraging an application that performs many temporary-file accesses. (CVE-2015-8878)

The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table. (CVE-2015-8879)

Alerts:
Red Hat RHSA-2016:2750-01 rh-php56 2016-11-15
openSUSE openSUSE-SU-2016:1688-1 php5 2016-06-27
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
SUSE SUSE-SU-2016:1581-1 php53 2016-06-14
openSUSE openSUSE-SU-2016:1553-1 php5 2016-06-11
Debian-LTS DLA-499-1 php5 2016-05-31

Comments (none posted)

phpmyadmin: cross-site scripting

Package(s):phpmyadmin CVE #(s):CVE-2016-5099
Created:May 31, 2016 Updated:June 2, 2016
Description: From the Mageia advisory:

In phpMyAdmin before 4.4.15.6, a specially crafted attack could allow for special HTML characters to be passed as URL encoded values and displayed back as special characters in the page.

Alerts:
Debian DSA-3627-1 phpmyadmin 2016-07-24
Gentoo 201701-32 phpmyadmin 2017-01-11
openSUSE openSUSE-SU-2016:1556-1 phpMyAdmin 2016-06-11
Fedora FEDORA-2016-cd05bd994a phpMyAdmin 2016-06-05
Fedora FEDORA-2016-55261b6815 phpMyAdmin 2016-06-01
openSUSE openSUSE-SU-2016:1434-1 phpMyAdmin 2016-05-29
Mageia MGASA-2016-0211 phpmyadmin 2016-05-29

Comments (none posted)

phpmyadmin: two vulnerabilities

Package(s):phpMyAdmin CVE #(s):CVE-2016-5097 CVE-2016-5098
Created:June 2, 2016 Updated:June 2, 2016
Description: From the Red Hat bugzilla:

File Traversal Protection Bypass on Error Reporting (PMASA-2016-15):

A specially crafted payload could result in the error reporting component exposing whether an arbitrary file exists on the file system and the size of that file.

The attacker must be able to intercept and modify the user's POST data and must be able to trigger a JavaScript error to the user.

This attack can be mitigated in affected installations by setting `$cfg['Servers'][$i]['SendErrorReports'] = 'never';`. Upgrading to a more recent development commit is suggested. (CVE-2016-5098)

Sensitive Data in URL GET Query Parameters (PMASA-2016-14):

Because user SQL queries are part of the URL, sensitive information made as part of a user query can be exposed by clicking on external links to attackers monitoring user GET query parameters or included in the webserver logs.

As mitigation, avoid clicking on external links in phpMyAdmin which are not redirected through url.php script.

Affects versions prior to 4.6.2. (CVE-2016-5097)

Alerts:
Gentoo 201701-32 phpmyadmin 2017-01-11
openSUSE openSUSE-SU-2016:1556-1 phpMyAdmin 2016-06-11
Fedora FEDORA-2016-cd05bd994a phpMyAdmin 2016-06-05
Fedora FEDORA-2016-55261b6815 phpMyAdmin 2016-06-01

Comments (none posted)

postgresql: multiple vulnerabilities

Package(s):postgresql-9.1 CVE #(s):
Created:May 31, 2016 Updated:June 2, 2016
Description: From the Debian LTS advisory:

The PostgreSQL project released a new version of the PostgreSQL 9.1 branch:

* Clear the OpenSSL error queue before OpenSSL calls, rather than assuming it's clear already; and make sure we leave it clear afterwards (Peter Geoghegan, Dave Vitek, Peter Eisentraut)

This change prevents problems when there are multiple connections using OpenSSL within a single process and not all the code involved follows the same rules for when to clear the error queue. Failures have been reported specifically when a client application uses SSL connections in libpq concurrently with SSL connections using the PHP, Python, or Ruby wrappers for OpenSSL. It's possible for similar problems to arise within the server as well, if an extension module establishes an outgoing SSL connection.

* Fix "failed to build any N-way joins" planner error with a full join enclosed in the right-hand side of a left join (Tom Lane)

* Fix possible misbehavior of TH, th, and Y,YYY format codes in to_timestamp() (Tom Lane)

These could advance off the end of the input string, causing subsequent format codes to read garbage.

* Fix dumping of rules and views in which the array argument of a value operator ANY (array) construct is a sub-SELECT (Tom Lane)

* Make pg_regress use a startup timeout from the PGCTLTIMEOUT environment variable, if that's set (Tom Lane)

This is for consistency with a behavior recently added to pg_ctl; it eases automated testing on slow machines.

* Fix pg_upgrade to correctly restore extension membership for operator families containing only one operator class (Tom Lane)

In such a case, the operator family was restored into the new database, but it was no longer marked as part of the extension. This had no immediate ill effects, but would cause later pg_dump runs to emit output that would cause (harmless) errors on restore.

* Rename internal function strtoi() to strtoint() to avoid conflict with a NetBSD library function (Thomas Munro)

* Use the FORMAT_MESSAGE_IGNORE_INSERTS flag where appropriate. No live bug is known to exist here, but it seems like a good idea to be careful.

Alerts:
Debian-LTS DLA-491-1 postgresql-9.1 2016-05-27

Comments (none posted)

qemu: two vulnerabilities

Package(s):qemu CVE #(s):CVE-2016-4439 CVE-2016-4441
Created:May 31, 2016 Updated:June 6, 2016
Description: From the CVE entries:

The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors. (CVE-2016-4439)

The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command. (CVE-2016-4441)

Alerts:
SUSE SUSE-SU-2016:2725-1 xen 2016-11-04
SUSE SUSE-SU-2016:2528-1 xen 2016-10-13
SUSE SUSE-SU-2016:2533-1 xen 2016-10-13
openSUSE openSUSE-SU-2016:2497-1 xen 2016-10-11
openSUSE openSUSE-SU-2016:2494-1 xen 2016-10-11
Gentoo 201609-01 qemu 2016-09-25
SUSE SUSE-SU-2016:2100-1 xen 2016-08-18
SUSE SUSE-SU-2016:2093-1 xen 2016-08-17
Ubuntu USN-3047-2 qemu, qemu-kvm 2016-08-12
Ubuntu USN-3047-1 qemu, qemu-kvm 2016-08-04
Debian-LTS DLA-574-1 qemu-kvm 2016-07-30
Debian-LTS DLA-573-1 qemu 2016-07-30
SUSE SUSE-SU-2016:1785-1 kvm 2016-07-11
openSUSE openSUSE-SU-2016:1750-1 qemu 2016-07-06
SUSE SUSE-SU-2016:1703-1 qemu 2016-06-29
SUSE SUSE-SU-2016:1698-1 kvm 2016-06-28
SUSE SUSE-SU-2016:1560-1 qemu 2016-06-13
Fedora FEDORA-2016-4edd58a3b5 xen 2016-06-12
Fedora FEDORA-2016-d3a56228f5 qemu 2016-06-07
Fedora FEDORA-2016-8d3fe9914b xen 2016-06-05
Fedora FEDORA-2016-07eca37ea0 qemu 2016-05-31

Comments (none posted)

ruby-mail: SMTP injection

Package(s):ruby-mail CVE #(s):
Created:May 26, 2016 Updated:June 2, 2016
Description: From the Debian-LTS advisory:

Takeshi Terada (Mitsui Bussan Secure Directions, Inc.) released a whitepaper entitled "SMTP Injection via recipient email addresses" ( http://www.mbsd.jp/Whitepaper/smtpi.pdf). This whitepaper has a section discussing how one such vulnerability affected the 'mail' ruby gem (see section 3.1).

Whitepaper has all the specific details, but basically the 'mail' ruby gem module is prone to the recipient attack as it does not validate nor sanitize given recipient addresses. Thus, the attacks described in chapter 2 of the whitepaper can be applied to the gem without any modification. The 'mail' ruby gem itself does not impose a length limit on email addresses, so an attacker can send a long spam message via a recipient address unless there is a limit on the application's side. This vulnerability affects only the applications that lack input validation.

Alerts:
Debian-LTS DLA-489-1 ruby-mail 2016-05-25

Comments (none posted)

symfony: two vulnerabilities

Package(s):symfony CVE #(s):CVE-2016-1902 CVE-2016-4423
Created:May 31, 2016 Updated:June 2, 2016
Description: From the Debian advisory:

CVE-2016-1902: Lander Brandt discovered that the class SecureRandom might generate weak random numbers for cryptographic use under certain settings. If the functions random_bytes() or openssl_random_pseudo_bytes() are not available, the output of SecureRandom should not be consider secure.

CVE-2016-4423: Marek Alaksa from Citadelo discovered that it is possible to fill up the session storage space by submitting inexistent large usernames.

Alerts:
Debian DSA-3588-1 symfony 2016-05-29

Comments (none posted)

virtualbox: unspecified

Package(s):virtualbox CVE #(s):CVE-2016-0678
Created:June 1, 2016 Updated:June 2, 2016
Description: From the CVE entry:

Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.18 allows local users to affect confidentiality, integrity, and availability via vectors related to Core.

Alerts:
Mageia MGASA-2016-0226 virtualbox 2016-06-17
openSUSE openSUSE-SU-2016:1462-1 virtualbox 2016-06-01
openSUSE openSUSE-SU-2016:1451-1 virtualbox 2016-05-31

Comments (none posted)

webkitgtk4: two vulnerabilities

Package(s):webkitgtk4 CVE #(s):CVE-2016-1857 CVE-2016-1856
Created:May 31, 2016 Updated:June 21, 2016
Description: From the CVE entries:

WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1856. (CVE-2016-1857)

WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1857. (CVE-2016-1856)

Alerts:
Ubuntu USN-3079-1 webkit2gtk 2016-09-14
Mageia MGASA-2016-0294 webkit2 2016-08-31
Fedora FEDORA-2016-f5107c318e webkitgtk4 2016-06-20
Arch Linux ASA-201606-3 webkit2gtk 2016-06-04
Fedora FEDORA-2016-c1f4334ded webkitgtk4 2016-05-28

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2012-6052 CVE-2012-6053 CVE-2012-6055 CVE-2012-6057 CVE-2012-6058 CVE-2012-6059 CVE-2012-6060 CVE-2012-6061 CVE-2012-6062
Created:May 31, 2016 Updated:June 2, 2016
Description: From the Debian LTS advisory:

Multiple vulnerabilities were discovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in denial of service.

This update also fixes many older less important issues by updating the package to the version found in Debian 8 also known as Jessie.

Alerts:
Debian-LTS DLA-497-1 wireshark 2016-05-31

Comments (none posted)

xen: privilege escalation

Package(s):xen CVE #(s):CVE-2016-4480
Created:May 31, 2016 Updated:June 2, 2016
Description: From the CVE entry:

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

Alerts:
SUSE SUSE-SU-2016:2725-1 xen 2016-11-04
SUSE SUSE-SU-2016:2528-1 xen 2016-10-13
SUSE SUSE-SU-2016:2533-1 xen 2016-10-13
openSUSE openSUSE-SU-2016:2497-1 xen 2016-10-11
openSUSE openSUSE-SU-2016:2494-1 xen 2016-10-11
Debian-LTS DLA-571-1 xen 2016-07-30
Debian DSA-3633-1 xen 2016-07-27
Mageia MGASA-2017-0012 xen 2017-01-09
Fedora FEDORA-2016-8fd9019541 xen 2016-05-28
Fedora FEDORA-2016-19c82866bb xen 2016-05-28

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds