|
|
Subscribe / Log in / New account

Security

Typosquatting in package repositories

By Jake Edge
July 20, 2016

"Typosquatting" is normally associated with registering domain names that are variants of popular domains, such that a user trying to reach the site might mistype and land on the variant page, which might be serving up malware, ads, or some kind of phishing scam. But in early June, Nikolai Tschacher reported on some research he had done that used typos in package names for languages like Python and Ruby to show that their package repositories were vulnerable; an attacker could use that flaw to execute code on remote systems. It was a fairly eye-opening report (as is the thesis [PDF] it was based on) that bears some further scrutiny.

Package managers often require privileges, which makes packages both a security danger and a target for attackers. Distribution packages are normally signed by a distribution key, which makes it much harder—though certainly not impossible—for an attacker to subvert those packages. But language package repositories, or those for frameworks like Node.js, are not so centralized. In fact, they are meant to be places where anyone can upload their code, with little or no vetting of that code.

So it is relatively easy for an attacker to upload a package with malware to sites like the Python Package Index (PyPI), RubyGems.org, or npmjs.org, but that is only part of the puzzle. In order to get users to actually install the packages, they must be enticed to do that somehow—that's where typosquatting comes into play.

So, if there is a popular PyPI package called "requests", which, of course, there is, then a typo version of the name, "reqeusts", say, might find its way to some systems. A user who typed:

    $ sudo pip install reqeusts
would be installing a potentially malicious package—and doing so as root.

The danger of installing language packages as root is well known, but it is still regularly done. The pip command for Python runs setup.py from the package as part of the installation process. That makes it easy for a malicious actor to run their code to get malware onto the system—or for a researcher to add some non-malicious test code to the system. The JavaScript npm package manager and the Ruby gem package manager also provide ways to execute code at installation time.

So Tschacher created some 200 packages that each contained a notification program and used some form of typo for its name. He uploaded them to the repositories over a few months and waited to see what notifications he would get. The notification program gathered some basic information about the system and whether the user was doing the installation with administrative rights; that information was sent back to his server. The notification program also printed a warning to the user that explained that they had probably grabbed the wrong package with a link to a page about his research.

In two phases that totaled roughly two months, Tschacher gathered information from more than 17,000 unique IP addresses. Most of those were for PyPI packages (15,221), with far lesser amounts for RubyGems.org (1631) and npmjs.com (525) files. Those differences may reflect the relative popularity of the package repositories and/or cultural differences in those language communities. In any case, a whopping 43% of the installers did so with administrative rights.

There are other statistics that he gathered and reported in the blog post and thesis. For example, the installation requests came from a broad swath of the internet, including a few from .gov and .mil domains. Interestingly, roughly 10% of the IP addresses he could resolve to a hostname were requests from Amazon's AWS cloud service.

One other piece of his research was for the notification program to check the .bash_history files on Linux and other Unix systems to report on what other incorrect package names had been tried on the system. These might be standard library package names (e.g. urllib2) that can be registered in a repository, popular names of other tools (e.g. git, docker), or just shortened names of real packages (e.g. scikit rather than scikit-learn). He used some of the names he harvested that way in the second phase of running the experiment with good success.

His post lists several ways for package repositories to avoid these kinds of problems, starting with the obvious: "Prevent Direct Code Execution on Installations". His other suggestions in the post are to generate (and blacklist) potential typo candidate names and to analyze the repository server log files to find potential typos as well. The thesis itself goes into much more detail on ideas for reducing the vulnerability's footprint.

At some level, it is not terribly surprising that installing code uploaded by random folks on the internet is dangerous. Doing so as root is even more so, but there is generally plenty an attacker can do even if their code is only granted access to an unprivileged user account. Even if the typosquatting problem were reduced (by limiting the registration of typo package names, say) and the installation of the package did not directly run code provided by the attacker, there would still be concerns. Eventually, users may get the typo into their code and "import reqeusts" will obviously have to execute the code supplied by the reqeusts module—limiting typo registrations will reduce the problem, but can hardly eliminate it. Not to mention that users may simply be able to be tricked into installing any package name that an attacker chooses.

Curated package repositories, like those run by Linux distributions and others, go a long way toward eliminating these problems. But they also have to put a fair amount of bureaucracy between a code purveyor and the user in order to avoid distributing malicious code—which is just what PyPI and repositories like that are trying to avoid.

Something interesting to ponder is what might have happened to Tschacher had he done that research in the US. From his thesis it seems that he did correspond with PyPI operators and others while the research was ongoing, who asked him to make some changes (such as removing the pip typos in .bash_history piece), but were fairly tolerant overall. On the other hand, there are various US computer laws that have sometimes been (ab)used by (over)zealous prosecutors to go after security and other researchers. One hopes that legitimate research such as this would not be so affected.

Comments (4 posted)

Brief items

Security quotes of the week

At a 2013 technology conference, Google CEO Eric Schmidt tried to reassure the audience by saying that he was 'pretty sure that information within Google is now safe from any government's prying eyes'.

A more accurate statement might have been: 'Your data is safe from governments, except for the ways we don’t know about and the ways we cannot tell you about.' The other thing Schmidt didn't say is: 'And of course, we still have complete access to it all, and can sell it to whomever we want… and you will have no recourse.'

Bruce Schneier

Android uses multiple layers of protection to keep users safe. One of these layers is verified boot, which improves security by using cryptographic integrity checking to detect changes to the operating system. Android has alerted about system integrity since Marshmallow, but starting with devices first shipping with Android 7.0, we require verified boot to be strictly enforcing. This means that a device with a corrupt boot image or verified partition will not boot or will boot in a limited capacity with user consent. Such strict checking, though, means that non-malicious data corruption, which previously would be less visible, could now start affecting process functionality more.
Sami Tolvanen on the Android Developers Blog

The bug resides in a code library used in a wide range of telecommunication products, including radios in cell towers, routers, and switches, as well as the baseband chips in individual phones. Although exploiting the heap overflow vulnerability would require great skill and resources, attackers who managed to succeed would have the ability to execute malicious code on virtually all of those devices. The code library was developed by Pennsylvania-based Objective Systems and is used to implement a telephony standard known as ASN.1, short for Abstract Syntax Notation One.
Dan Goodin in Ars Technica

Comments (3 posted)

Ubuntu forums compromised

Canonical has disclosed that the Ubuntu forum system has been compromised. "The attacker had the ability to inject certain formatted SQL to the Forums database on the Forums database servers. This gave them the ability to read from any table but we believe they only ever read from the ‘user’ table. They used this access to download portions of the ‘user’ table which contained usernames, email addresses and IPs for 2 million users. No active passwords were accessed."

Comments (44 posted)

Tor veteran Lucky Green exits, torpedos critical 'Tonga' node and relays (The Register)

The Register reports that longtime Tor contributor Lucky Green is quitting and closing down the node and bridge authority he operates. "Practically, it's a big deal. Bridge Authorities are part of the infrastructure that lets users get around some ISP-level blocks on the network (not, however, defeating deep packet inspection). They're also incorporated in the Tor code, meaning that to remove a Bridge Authority is going to need an update." The shutdown is scheduled for August 31. (Thanks to Nomen Nescio)

Comments (8 posted)

New vulnerabilities

atomic-openshift: information leak

Package(s):atomic-openshift CVE #(s):CVE-2016-5392
Created:July 15, 2016 Updated:July 20, 2016
Description:

From the Red Hat advisory:

The Kubernetes API server contains a watch cache that speeds up performance. Due to an input validation error OpenShift Enterprise may return data for other users and projects when queried by a user. An attacker with knowledge of other project names could use this vulnerability to view their information.

Alerts:
Red Hat RHSA-2016:1427-01 atomic-openshift 2016-07-14

Comments (none posted)

binutils: multiple vulnerabilities

Package(s):binutils CVE #(s):CVE-2016-2226 CVE-2016-4487 CVE-2016-4488 CVE-2016-4489 CVE-2016-4490 CVE-2016-4492 CVE-2016-4493 CVE-2016-6131
Created:July 18, 2016 Updated:July 20, 2016
Description: From the Debian LTS advisory:

Some minor security issues have been identified and fixed in binutils in Debian LTS. These are:

CVE-2016-2226: Exploitable buffer overflow.

CVE-2016-4487: Invalid write due to a use-after-free to array btypevec.

CVE-2016-4488: Invalid write due to a use-after-free to array ktypevec.

CVE-2016-4489: Invalid write due to integer overflow.

CVE-2016-4490: Write access violation.

CVE-2016-4492: Write access violations.

CVE-2016-4493: Read access violations.

CVE-2016-6131: Stack buffer overflow when printing bad bytes in Intel Hex objects

Alerts:
Debian-LTS DLA-552-1 binutils 2016-07-18

Comments (none posted)

ecryptfs-utils: two vulnerabilities

Package(s):ecryptfs-utils CVE #(s):CVE-2016-6224 CVE-2015-8946
Created:July 20, 2016 Updated:November 2, 2016
Description: From the Red Hat bugzilla:

CVE-2015-8946: A vulnerability was found in ecryptfs-setup-swap script that is provided by the upstream ecryptfs-utils project.

On systems using systemd 211 or newer and GPT partitioning, the unencrypted swap partition was being automatically activated during boot and the encrypted swap was not used. This was due to ecryptfs-setup-swap not marking the swap partition as "no-auto", as defined by the Discoverable Partitions Spec.

CVE-2016-6224: A vulnerability was found in ecryptfs-setup-swap script that is provided by the upstream ecryptfs-utils project.

When GPT swap partitions are located on NVMe or MMC drives, ecryptfs-setup-swap fails to mark these swap partitions as "no-auto".

As a consequence, when using encrypted home directory with an NVMe or MMC drive, the swap is left unencrypted. There's also a usability issue in that users are erroneously prompted to enter a pass-phrase to unlock their swap partition at boot.

This vulnerability exists due to an incomplete fix for CVE-2015-8946

Alerts:
Fedora FEDORA-2016-70b5173c05 ecryptfs-utils 2016-11-01
Ubuntu USN-3032-1 ecryptfs-utils 2016-07-14
Fedora FEDORA-2016-41301e2187 ecryptfs-utils 2016-07-20

Comments (none posted)

firefox: code execution

Package(s):MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss CVE #(s):CVE-2016-2824
Created:July 14, 2016 Updated:July 20, 2016
Description: From the SUSE advisory:

CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).

Alerts:
SUSE SUSE-SU-2016:2061-1 firefox, nspr, nss 2016-08-12
SUSE SUSE-SU-2016:1799-1 MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss 2016-07-14

Comments (none posted)

graphicsmagick: out-of-bounds read

Package(s):graphicsmagick CVE #(s):CVE-2016-8808
Created:July 15, 2016 Updated:July 20, 2016
Description:

From the Mageia advisory:

A read out-of-bound in the parsing of gif files using GraphicsMagick.

Alerts:
Mageia MGASA-2016-0252 graphicsmagick 2016-07-14

Comments (none posted)

httpd: HTTP redirect

Package(s):httpd apache apache2 CVE #(s):CVE-2016-5387
Created:July 19, 2016 Updated:August 22, 2016
Description: From the Red Hat advisory:

It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.

Alerts:
openSUSE openSUSE-SU-2016:2115-1 apache2-mod_fcgid 2016-08-19
Fedora FEDORA-2016-a29c65b00f perl-CGI-Emulate-PSGI 2016-08-09
Fedora FEDORA-2016-683d0b257b perl-CGI-Emulate-PSGI 2016-08-08
Debian-LTS DLA-568-1 wordpress 2016-07-29
Fedora FEDORA-2016-df0726ae26 httpd 2016-07-27
Mageia MGASA-2016-0262 apache 2016-07-26
Fedora FEDORA-2016-9fd9bfab9e httpd 2016-07-22
Debian-LTS DLA-553-1 apache2 2016-07-20
Debian DSA-3623-1 apache2 2016-07-20
Ubuntu USN-3038-1 apache2 2016-07-18
Scientific Linux SLSA-2016:1421-1 httpd 2016-07-18
Scientific Linux SLSA-2016:1422-1 httpd 2016-07-18
Oracle ELSA-2016-1421 httpd 2016-07-18
Oracle ELSA-2016-1421 httpd 2016-07-18
Oracle ELSA-2016-1422 httpd 2016-07-18
openSUSE openSUSE-SU-2016:1824-1 apache2 2016-07-19
CentOS CESA-2016:1421 httpd 2016-07-18
CentOS CESA-2016:1421 httpd 2016-07-18
CentOS CESA-2016:1422 httpd 2016-07-18
Red Hat RHSA-2016:1420-01 httpd24-httpd 2016-07-18
Red Hat RHSA-2016:1421-01 httpd 2016-07-18
Red Hat RHSA-2016:1422-01 httpd 2016-07-18
Gentoo 201701-36 apache 2017-01-15
Slackware SSA:2016-358-01 httpd 2016-12-23

Comments (none posted)

java-1.8.0-openjdk: multiple vulnerabilities

Package(s):java-1.8.0-openjdk CVE #(s):CVE-2016-3458 CVE-2016-3500 CVE-2016-3508 CVE-2016-3550 CVE-2016-3587 CVE-2016-3598 CVE-2016-3606 CVE-2016-3610
Created:July 20, 2016 Updated:September 13, 2016
Description: From the Red Hat advisory:

* Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3587, CVE-2016-3598, CVE-2016-3610)

* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508)

* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)

Alerts:
SUSE SUSE-SU-2016:2726-1 java-1_8_0-ibm 2016-11-04
Gentoo 201610-08 oracle-jdk-bin 2016-10-15
openSUSE openSUSE-SU-2016:2451-1 php5 2016-10-04
SUSE SUSE-SU-2016:2408-1 php5 2016-09-28
SUSE SUSE-SU-2016:2347-1 java-1_7_1-ibm 2016-09-21
SUSE SUSE-SU-2016:2328-1 php53 2016-09-16
Ubuntu USN-3077-1 openjdk-6 2016-09-12
SUSE SUSE-SU-2016:2286-1 java-1_7_0-ibm 2016-09-10
SUSE SUSE-SU-2016:2261-1 java-1_7_1-ibm 2016-09-07
Fedora FEDORA-2016-c07d18b2a5 java-1.8.0-openjdk-aarch32 2016-08-29
Oracle ELSA-2016-1776 java-1.6.0-openjdk 2016-08-26
Oracle ELSA-2016-1776 java-1.6.0-openjdk 2016-08-26
Oracle ELSA-2016-1776 java-1.6.0-openjdk 2016-08-26
Scientific Linux SLSA-2016:1776-1 java-1.6.0-openjdk 2016-08-26
CentOS CESA-2016:1776 java-1.6.0-openjdk 2016-08-26
CentOS CESA-2016:1776 java-1.6.0-openjdk 2016-08-26
CentOS CESA-2016:1776 java-1.6.0-openjdk 2016-08-26
Red Hat RHSA-2016:1776-01 java-1.6.0-openjdk 2016-08-26
Ubuntu USN-3062-1 openjdk-7 2016-08-16
openSUSE openSUSE-SU-2016:2058-1 OpenJDK7 2016-08-12
openSUSE openSUSE-SU-2016:2051-1 java-1_8_0-openjdk 2016-08-11
openSUSE openSUSE-SU-2016:2050-1 java-1_7_0-openjdk 2016-08-11
openSUSE openSUSE-SU-2016:2052-1 java-1_7_0-openjdk 2016-08-11
Red Hat RHSA-2016:1587-01 java-1.8.0-ibm 2016-08-10
Red Hat RHSA-2016:1588-01 java-1.7.1-ibm 2016-08-10
Red Hat RHSA-2016:1589-01 java-1.7.0-ibm 2016-08-10
SUSE SUSE-SU-2016:2012-1 java-1_8_0-openjdk 2016-08-09
SUSE SUSE-SU-2016:1997-1 java-1_7_0-openjdk 2016-08-09
openSUSE openSUSE-SU-2016:1979-1 java-1_8_0-openjdk 2016-08-06
Debian-LTS DLA-579-1 openjdk-7 2016-08-05
Debian DSA-3641-1 openjdk-7 2016-08-04
Arch Linux ASA-201608-5 jre7-openjdk-headless 2016-08-05
Arch Linux ASA-201608-4 jre7-openjdk 2016-08-05
Arch Linux ASA-201608-3 jdk7-openjdk 2016-08-05
Mageia MGASA-2016-0273 java-1.8.0-openjdk 2016-08-03
Fedora FEDORA-2016-c60d35c46c java-1.8.0-openjdk 2016-07-29
Fedora FEDORA-2016-588e386aaa java-1.8.0-openjdk 2016-07-28
Scientific Linux SLSA-2016:1504-1 java-1.7.0-openjdk 2016-07-27
Oracle ELSA-2016-1504 java-1.7.0-openjdk 2016-07-27
Oracle ELSA-2016-1504 java-1.7.0-openjdk 2016-07-27
Oracle ELSA-2016-1504 java-1.7.0-openjdk 2016-07-27
Ubuntu USN-3043-1 openjdk-8 2016-07-27
CentOS CESA-2016:1504 java-1.7.0-openjdk 2016-07-27
CentOS CESA-2016:1504 java-1.7.0-openjdk 2016-07-27
CentOS CESA-2016:1504 java-1.7.0-openjdk 2016-07-27
Red Hat RHSA-2016:1504-01 java-1.7.0-openjdk 2016-07-27
Scientific Linux SLSA-2016:1458-1 java-1.8.0-openjdk 2016-07-20
Oracle ELSA-2016-1458 java-1.8.0-openjdk 2016-07-20
Oracle ELSA-2016-1458 java-1.8.0-openjdk 2016-07-20
CentOS CESA-2016:1458 java-1.8.0-openjdk 2016-07-20
CentOS CESA-2016:1458 java-1.8.0-openjdk 2016-07-20
Red Hat RHSA-2016:1475-01 java-1.8.0-oracle 2016-07-21
Red Hat RHSA-2016:1476-01 java-1.7.0-oracle 2016-07-21
Red Hat RHSA-2016:1477-01 java-1.6.0-sun 2016-07-21
Red Hat RHSA-2016:1458-01 java-1.8.0-openjdk 2016-07-20
Gentoo 201701-43 icedtea-bin 2017-01-19

Comments (none posted)

kernel: code execution

Package(s):kernel CVE #(s):CVE-2016-4794
Created:July 14, 2016 Updated:July 20, 2016
Description: From the openSUSE advisory:

CVE-2016-4794: Use-after-free vulnerability in mm/percpu.c in the Linux kernel allowed local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls (bnc#980265).

Alerts:
Oracle ELSA-2016-2574 kernel 2016-11-10
Red Hat RHSA-2016:2584-02 kernel-rt 2016-11-03
Red Hat RHSA-2016:2574-02 kernel 2016-11-03
Mageia MGASA-2016-0283 kernel-tmb 2016-08-31
Mageia MGASA-2016-0284 kernel-linus 2016-08-31
Ubuntu USN-3057-1 linux-snapdragon 2016-08-10
Ubuntu USN-3056-1 linux-raspi2 2016-08-10
Ubuntu USN-3054-1 linux-lts-xenial 2016-08-10
Ubuntu USN-3053-1 linux-lts-vivid 2016-08-10
Ubuntu USN-3055-1 kernel 2016-08-10
Mageia MGASA-2016-0271 kernel 2016-07-31
openSUSE openSUSE-SU-2016:1798-1 kernel 2016-07-14
Scientific Linux SLSA-2016:2574-2 kernel 2016-12-14
Oracle ELSA-2016-3644 kernel 4.1.12 2016-11-21
Oracle ELSA-2016-3644 kernel 4.1.12 2016-11-21

Comments (none posted)

kernel: two vulnerabilities

Package(s):kernel CVE #(s):CVE-2016-5696 CVE-2016-6156
Created:July 20, 2016 Updated:September 28, 2016
Description: From the Red Hat bugzilla:

CVE-2016-5696: A flaw was found in the implementation of the Linux kernels handling of networking challenge ack where an attacker is able to determine the shared counter.

This may allow an attacker to inject or take over a TCP connection between a server and client without having to be a traditional Man In the Middle (MITM) style attack.

CVE-2016-6156: Double-fetch vulnerability was found in /drivers/platform/chrome/cros_ec_dev.c in the Chrome driver in the Linux kernel before 4.6.1.

In function ec_device_ioctl_xcmd(), the driver fetches user space data by pointer arg via copy_from_user(), and this happens twice at line 137 and line 145 respectively.

Alerts:
Oracle ELSA-2016-2574 kernel 2016-11-10
openSUSE openSUSE-SU-2016:2625-1 kernel 2016-10-25
Oracle ELSA-2016-2006 kernel 2016-10-04
Red Hat RHSA-2016:1939-01 kernel 2016-09-27
Oracle ELSA-2016-3617 kernel 2016-09-22
Oracle ELSA-2016-3617 kernel 2016-09-22
Ubuntu USN-3084-4 linux-snapdragon 2016-09-19
Ubuntu USN-3084-3 linux-raspi2 2016-09-19
Ubuntu USN-3084-2 linux-lts-xenial 2016-09-19
Ubuntu USN-3084-1 kernel 2016-09-19
Oracle ELSA-2016-1847 kernel 2016-09-14
openSUSE openSUSE-SU-2016:2290-1 kernel 2016-09-12
SUSE SUSE-SU-2016:2245-1 kernel 2016-09-06
SUSE SUSE-SU-2017:0471-1 kernel 2017-02-15
Debian-LTS DLA-609-1 kernel 2016-09-03
Debian DSA-3659-1 kernel 2016-09-04
Red Hat RHSA-2016:1814-01 kernel 2016-09-06
Red Hat RHSA-2016:1815-01 kernel 2016-09-06
Ubuntu USN-3070-3 linux-snapdragon 2016-08-30
Ubuntu USN-3070-2 linux-raspi2 2016-08-30
Ubuntu USN-3070-4 linux-lts-xenial 2016-08-30
Mageia MGASA-2016-0283 kernel-tmb 2016-08-31
Ubuntu USN-3072-2 linux-ti-omap4 2016-08-29
Ubuntu USN-3071-2 linux-lts-trusty 2016-08-29
Ubuntu USN-3072-1 kernel 2016-08-29
Ubuntu USN-3071-1 kernel 2016-08-29
Ubuntu USN-3070-1 kernel 2016-08-29
Slackware SSA:2016-242-01 kernel 2016-08-29
Slackware SSA:2016-236-03 kernel 2016-08-23
Scientific Linux SLSA-2016:1664-1 kernel 2016-08-23
Oracle ELSA-2016-1664 kernel 2016-08-23
Red Hat RHSA-2016:1664-01 kernel 2016-08-23
Red Hat RHSA-2016:1657-01 kernel 2016-08-23
CentOS CESA-2016:1664 kernel 2016-08-23
Scientific Linux SLSA-2016:1633-1 kernel 2016-08-19
CentOS CESA-2016:1633 kernel 2016-08-20
Arch Linux ASA-201608-17 linux-lts 2016-08-21
Oracle ELSA-2016-1633 kernel 2016-08-18
SUSE SUSE-SU-2017:0437-1 the Linux Kernel 2017-02-09
Red Hat RHSA-2016:1631-01 realtime-kernel 2016-08-18
Red Hat RHSA-2016:1632-01 kernel-rt 2016-08-18
Red Hat RHSA-2016:1633-01 kernel 2016-08-18
Arch Linux ASA-201608-15 linux-zen 2016-08-17
Oracle ELSA-2016-3595 kernel 3.8.13 2016-08-15
Oracle ELSA-2016-3595 kernel 3.8.13 2016-08-15
Oracle ELSA-2016-3594 kernel 4.1.12 2016-08-15
Oracle ELSA-2016-3594 kernel 4.1.12 2016-08-15
Arch Linux ASA-201608-13 linux-grsec 2016-08-14
Arch Linux ASA-201608-12 kernel 2016-08-14
Mageia MGASA-2016-0271 kernel 2016-07-31
Fedora FEDORA-2016-784d5526d8 kernel 2016-07-19
Fedora FEDORA-2016-9a16b2e14e kernel 2016-07-20
SUSE SUSE-SU-2016:3304-1 kernel 2016-12-30
SUSE SUSE-SU-2016:3069-1 kernel 2016-12-09
openSUSE openSUSE-SU-2016:3021-1 kernel 2016-12-06
SUSE SUSE-SU-2016:2976-1 the Linux Kernel 2016-12-02
SUSE SUSE-SU-2016:2912-1 kernel 2016-11-25

Comments (none posted)

libarchive: multiple vulnerabilities

Package(s):libarchive CVE #(s):CVE-2015-8916 CVE-2015-8917 CVE-2015-8919 CVE-2015-8920 CVE-2015-8921 CVE-2015-8922 CVE-2015-8923 CVE-2015-8924 CVE-2015-8925 CVE-2015-8926 CVE-2015-8928 CVE-2015-8930 CVE-2015-8931 CVE-2015-8932 CVE-2015-8933
Created:July 15, 2016 Updated:July 20, 2016
Description:

From the Ubuntu advisory:

Hanno Böck discovered that libarchive contained multiple security issues when processing certain malformed archive files. A remote attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code.

Alerts:
CentOS CESA-2016:1844 libarchive 2016-09-16
CentOS CESA-2016:1850 libarchive 2016-09-15
Scientific Linux SLSA-2016:1850-1 libarchive 2016-09-12
Scientific Linux SLSA-2016:1844-1 libarchive 2016-09-12
Red Hat RHSA-2016:1850-01 libarchive 2016-09-12
Red Hat RHSA-2016:1844-01 libarchive 2016-09-12
Debian DSA-3657-1 libarchive 2016-08-30
openSUSE openSUSE-SU-2016:2036-1 libarchive 2016-08-11
SUSE SUSE-SU-2016:1939-1 bsdtar 2016-08-02
SUSE SUSE-SU-2016:1909-1 libarchive 2016-07-29
Debian-LTS DLA-554-1 libarchive 2016-07-21
Ubuntu USN-3033-1 libarchive 2016-07-14
Gentoo 201701-03 libarchive 2017-01-01

Comments (none posted)

libgd2: two vulnerabilities

Package(s):libgd2 CVE #(s):CVE-2016-6132 CVE-2016-6214
Created:July 18, 2016 Updated:July 20, 2016
Description: From the Debian advisory:

Several vulnerabilities were discovered in libgd2, a library for programmatic graphics creation and manipulation. A remote attacker can take advantage of these flaws to cause a denial-of-service against an application using the libgd2 library (application crash), or potentially to execute arbitrary code with the privileges of the user running the application.

Alerts:
openSUSE openSUSE-SU-2016:2363-1 gd 2016-09-24
openSUSE openSUSE-SU-2016:2117-1 gd 2016-08-19
Ubuntu USN-3060-1 libgd2 2016-08-10
Mageia MGASA-2016-0258 libgd 2016-07-26
Fedora FEDORA-2016-615f3bf06e gd 2016-07-24
Debian DSA-3619-1 libgd2 2016-07-15
Gentoo 201612-09 gd 2016-12-04

Comments (none posted)

openjpeg2: multiple vulnerabilities

Package(s):openjpeg2 CVE #(s):CVE-2016-3183 CVE-2016-3181 CVE-2016-3182 CVE-2016-4796 CVE-2016-4797
Created:July 15, 2016 Updated:July 20, 2016
Description:

From the Fedora advisory:

CVE-2016-3182: Heap corruption in opj_free function.

CVE-2016-3181: Out-of-bounds read in opj_tcd_free_tile function.

CVE-2016-3183: Out-of-bounds read in sycc422_to_rgb function.

CVE-2016-4797: Division-by-zero in function opj_tcd_init_tile in tcd.c.

CVE-2016-4796: Heap buffer overflow in function color_cmyk_to_rgb in color.c.

Alerts:
Mageia MGASA-2016-0362 openjpeg2 2016-11-03
Fedora FEDORA-2016-14d8f9b4ed mingw-openjpeg2 2016-07-18
Fedora FEDORA-2016-8fa7ced365 mingw-openjpeg2 2016-07-18
Fedora FEDORA-2016-d2ab705e4a openjpeg2 2016-07-16
Fedora FEDORA-2016-abdc548f46 openjpeg2 2016-07-14
Gentoo 201612-26 openjpeg 2016-12-08

Comments (none posted)

pagure: unspecified

Package(s):pagure CVE #(s):
Created:July 19, 2016 Updated:July 20, 2016
Description:

Pagure 2.2.2 fixes undisclosed vulnerabilities.

Alerts:
Fedora FEDORA-2016-dede12f0a2 pagure 2016-07-18

Comments (none posted)

perl: code execution

Package(s):perl CVE #(s):CVE-2016-6185
Created:July 18, 2016 Updated:September 16, 2016
Description: From the Red Hat bugzilla:

An arbitrary code execution can be achieved if loading code from untrusted current working directory despite the '.' is removed from @INC. Vulnerability is in XSLoader that uses caller() information to locate .so file to load. If malicious attacker creates directory named `(eval 1)` with malicious binary file in it, it will be loaded if the package calling XSLoader is in parent directory.

Alerts:
Mageia MGASA-2016-0299 perl-XSLoader 2016-09-16
openSUSE openSUSE-SU-2016:2313-1 perl 2016-09-15
Debian-LTS DLA-565-1 perl 2016-07-28
Debian DSA-3628-1 perl 2016-07-25
Fedora FEDORA-2016-742bde2be7 perl 2016-07-18
Fedora FEDORA-2016-485dff6060 perl 2016-07-18
Fedora FEDORA-2016-eb2592245b perl 2016-07-15
Gentoo 201701-75 perl 2017-01-30

Comments (none posted)

python-django: cross-site scripting

Package(s):python-django CVE #(s):CVE-2016-6186
Created:July 19, 2016 Updated:August 31, 2016
Description: From the Debian advisory:

It was discovered that Django, a high-level Python web development framework, is prone to a cross-site scripting vulnerability in the admin's add/change related popup.

Alerts:
Mageia MGASA-2016-0282 python-django 2016-08-31
Red Hat RHSA-2016:1594-01 python-django 2016-08-11
Red Hat RHSA-2016:1595-01 python-django 2016-08-11
Red Hat RHSA-2016:1596-01 python-django 2016-08-11
Fedora FEDORA-2016-97ca9d52a4 python-django 2016-08-02
Fedora FEDORA-2016-b7e31a0b9a python-django 2016-08-02
Arch Linux ASA-201607-11 python2-django 2016-07-22
Arch Linux ASA-201607-10 python-django 2016-07-22
Debian-LTS DLA-555-1 python-django 2016-07-21
Ubuntu USN-3039-1 python-django 2016-07-19
Debian DSA-3622-1 python-django 2016-07-18

Comments (none posted)

ruby-eventmachine: denial of service

Package(s):ruby-eventmachine CVE #(s):
Created:July 18, 2016 Updated:August 8, 2016
Description: From the Debian LTS advisory:

EventMachine, a Ruby network engine could be crashed by opening a high number of parallel connections (>= 1024) towards a server using the EventMachine engine. The crash happens due to the file descriptors overwriting the stack.

Alerts:
Mageia MGASA-2016-0276 ruby-eventmachine 2016-08-06
Debian-LTS DLA-549-1 ruby-eventmachine 2016-07-15

Comments (none posted)

sudo: race condition

Package(s):sudo CVE #(s):CVE-2015-8239
Created:July 18, 2016 Updated:July 27, 2016
Description: From the Red Hat bugzilla:

A vulnerability in functionality for adding support of SHA-2 digests along with the command was found. The sudoers plugin performs this digest verification while matching rules, and later independently calls execve() to execute the binary. This results in a race condition if the digest functionality is used as suggested (in fact, the rules are matched before the user is prompted for a password, so there is not negligible time frame to replace the binary from underneath sudo). Versions affected are since 1.8.7.

Alerts:
Mageia MGASA-2016-0261 sudo 2016-07-26
Fedora FEDORA-2016-90836ca57d sudo 2016-07-15
Fedora FEDORA-2016-f1e8e27e27 sudo 2016-07-16

Comments (none posted)

util-linux: denial of service

Package(s):util-linux CVE #(s):CVE-2016-5011
Created:July 15, 2016 Updated:December 15, 2016
Description:

From the Mageia advisory:

The util-linux libblkid is vulnerable to a Denial of Service attack during MSDOS partition table parsing, in the extended partition boot record (EBR). If the next EBR starts at relative offset 0, parse_dos_extended() will loop until running out of memory. An attacker could install a specially crafted MSDOS partition table in a storage device and trick a user into using it. This library is used, among others, by systemd-udevd daemon.

Alerts:
Oracle ELSA-2016-2605 util-linux 2016-11-10
Red Hat RHSA-2016:2605-02 util-linux 2016-11-03
Mageia MGASA-2016-0256 util-linux 2016-07-14
Scientific Linux SLSA-2016:2605-2 util-linux 2016-12-14
openSUSE openSUSE-SU-2016:3102-1 util-linux 2016-12-12
openSUSE openSUSE-SU-2016:2840-1 util-linux 2016-11-17

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds