|
|
Log in / Subscribe / Register

Security

Qubes OS and colored-border spoofing

By Jake Edge
October 26, 2016

A bug in the graphical user interface (GUI) of the security-focused Qubes OS distribution ("A reasonably secure operating system") would allow malicious applications to fool users—just the kind of thing that the OS focuses on preventing. While the bug itself is fairly run of the mill, its existence is more evidence, if any is really needed, that security is hard—and that there are plentiful pitfalls for distributions of this type.

The idea behind Qubes OS has not changed much since we first looked at it back in 2010: isolate different applications (and groups of applications) into separate security domains using Xen virtual machines (VMs). That way, a compromise in a web browser, say, cannot access programs, devices (e.g. webcams or microphones), or data that is not sharing the same VM with the compromised program.

[Qubes OS desktop]

In order to help users differentiate the programs running in different domains, Qubes OS colors the window borders of each application with a color that indicates which "qube" it belongs to. In the default install, three qubes are created: work, personal, and untrusted. Programs running within each get the same color; the Get Started document suggests using green for a trusted qube, red for untrusted, and yellow/orange for those in between. An example from that page (seen at right) shows a word processor with a green border and a web browser with red.

But applications control the contents of their windows and can create their own "windows" that have any border color they choose, as long as those windows are completely within the main application window. As the Security Guidelines document says: "Remember that a 'red' Firefox, can always draw a 'green' password prompt box, and you don’t want to enter your password there!" It suggests using desktop effects (such as Alt-Tab or "Present Windows" in KDE/Plasma) or moving suspect windows to the trusted background wallpaper. That way, Qubes OS can show the window with its proper border color or otherwise indicate which VM the window belongs to.

Qubes OS does all of this by running the desktop environment and main X server in the privileged domain (i.e. dom0). A GUI protocol is used to communicate from the qubes to the X server. There is an X server and GUI client running in each qube that communicate with a GUI daemon running in dom0. That is what allows Qubes OS to enforce its rules on windows that are created in the qubes.

However a bug reported in mid-September provides another way that a malicious application could fool users into entering sensitive information into untrusted qubes. X11 has an override_redirect flag that can be set by applications for windows that are not meant to be handled by the window manager (typically for UI elements like tooltips or menus). The Qubes OS GUI component uses the flag to determine if it should manage the window (to draw small colored borders around menus/tooltips and to ensure that those borders are visible on the screen) or if the window manager will draw the window decorations that include the larger colored border.

Applications are allowed to change the value of the override_redirect property and Qubes OS will track that change. But, due to the bug, it only tracks it internally and does not actually make the change to the window using the X API. That means a window that disables override_redirect will be treated by Qubes OS as if it is being managed by the window manager, but the window manager will not be informed that it should be doing so. That will allow malicious applications to spoof windows and confuse users.

Using the Alt-Tab window switcher or "Expose-like" effects (as suggested before inputting sensitive information) in the desktop environment may help users see that something strange is going on. But that adds another "ease of use" barrier for users—even if it has been the recommended practice all along.

While spoofing in the GUI is clearly the biggest threat, there is a kind of denial-of-service (DoS) attack that a malicious application can perform. Creating large windows that are not managed can completely obscure the rest of the desktop and, since there is no window manager placing controls on the windows for closing or minimizing them, the user will have no easy way to get rid of them. The advisory does list some ways around that problem, which may involve blindly typing into a privileged terminal application—something that seems a bit worrisome. This GUI DoS attack has been known for some time and the advisory notes that "Qubes should offer a more user-friendly solution to deal with such GUI DoS attacks".

The problem has existed since the initial commit of the GUI daemon back in 2010. It was fixed in mid-September and is available in version 3.2.5 and higher of the qubes-gui-dom0 package (or 3.1.5 and higher for those running Qubes OS 3.1).

The bug in some ways highlights the difficulties in providing a more secure environment for users—and in how to display that information in a cohesive and comprehensible way. Qubes OS has done an admirable job of trying to make it easier for users but, as always, bugs will creep in. Part of the problem may be the need to rely on applications that have been built on top of protocols and libraries that long pre-date the security needs of today's users. The window handling in X11 leads to the suggested Alt-Tab dance, for example.

One wonders if Wayland, which was designed with security more in mind, will eventually help here. It will seemingly be a while (still) before Wayland-native applications are commonplace and, of course, bugs will still be present, but a security-focused design may eventually lead to better desktop security for Qubes OS and others—or not, only time will truly tell.

Comments (1 posted)

Brief items

Security quotes of the week

DrK is an attack that breaks kernel address space layout randomization (KASLR) by exploiting TLB and decoded i-cache side channel. To reliably exploit the side channels, the DrK attack took advantage of Intel TSX (Transactional Synchronization eXtension). One surprising behavior of TSX, which is essentially the root cause of this security loophole, is that it aborts a transaction without notifying the underlying kernel even when the transaction fails due to a critical error, such as a page fault or an access violation, which traditionally requires kernel intervention. DrK turns this property into a precise timing channel that can determine the mapping status (i.e., mapped versus unmapped) and execution status (i.e., executable versus non-executable) of the privileged kernel address space. Since such behavior is on the hardware level, DrK is universally applicable to all OSes, even in virtualized environments, and generates no visible footprint, making it difficult to detect in practice. Therefore, DrK can break the KASLR of all major OSes (i.e., Windows, Linux, and OS X) with near-perfect accuracy in under a second.
Yeongjin Jang, Sangho Lee, and Taesoo Kim on a de-randomizing kernel address-space layout randomization (ASLR) attack [PDF] (Thanks to Paul Wise.)

An app containing the researchers' rooting exploit requires no user permissions and doesn't rely on any vulnerability in Android to work. Instead, their attack exploits a hardware vulnerability, using a Rowhammer exploit that alters crucial bits of data in a way that completely roots name brand Android devices from LG, Motorola, Samsung, OnePlus, and possibly other manufacturers.
Dan Goodin in Ars Technica

My vacuum cleaner crashes if I send certain malformed HTTP requests to the local API endpoint, which isn't a good sign
Matthew Garrett looks at Internet of Things security (again)

Do I think this is good enough security: absolutely. In security, the bear principle applies: in that when escaping from a ravenous bear, you don’t have to be able to run faster than the bear itself, you merely need to be able to run faster than the slowest other potential food source ... In internet terms, this means that while there are so many completely insecure devices out there, no-one can be bothered to hack a moderately secure system like mine because the customisation makes it quite a bit harder. It’s also instructive to think that the bear principle is why Linux has such a security reputation: it’s not that we have perfect security against virus and trojan systems, it’s just that Windows was always so much worse ...
James Bottomley

Comments (6 posted)

More information about Dirty COW (aka CVE-2016-5195)

The security hole fixed in the 4.8.3, 4.7.9, and 4.4.26 stable kernel updates has been dubbed Dirty COW (CVE-2016-5195) by a site devoted to the kernel privilege escalation vulnerability. There is some indication that it is being exploited in the wild. Ars Technica has some additional information. The Red Hat bugzilla entry and advisory are worth looking at as well.

Comments (19 posted)

New vulnerabilities

asterisk: two vulnerabilities

Package(s):asterisk CVE #(s):CVE-2016-2232 CVE-2016-7551
Created:October 26, 2016 Updated:October 26, 2016
Description: From the CVE entry:

Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost. (CVE-2016-2232)

From the Debian advisory:

Multiple vulnerabilities have been discovered in Asterisk, an open source PBX and telephony toolkit, which may result in denial of service or incorrect certificate validation.

Alerts:
Debian DSA-3700-1 asterisk 2016-10-25
Debian-LTS DLA-781-1 asterisk 2017-01-13

Comments (none posted)

bind: denial of service

Package(s):bind CVE #(s):CVE-2016-2848
Created:October 21, 2016 Updated:October 26, 2016
Description: From the Red Hat advisory:

A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)

Alerts:
Red Hat RHSA-2016:2099-01 bind 2016-10-25
Oracle ELSA-2016-2094 bind97 2016-10-21
Oracle ELSA-2016-2093 bind 2016-10-21
Oracle ELSA-2016-2093 bind 2016-10-21
CentOS CESA-2016:2094 bind97 2016-10-21
CentOS CESA-2016:2093 bind 2016-10-21
CentOS CESA-2016:2093 bind 2016-10-21
Ubuntu USN-3108-1 bind9 2016-10-21
Scientific Linux SLSA-2016:2094-1 bind97 2016-10-20
Scientific Linux SLSA-2016:2093-1 bind 2016-10-20
Debian-LTS DLA-672-1 bind9 2016-10-20
Red Hat RHSA-2016:2094-01 bind97 2016-10-20
Red Hat RHSA-2016:2093-01 bind 2016-10-20

Comments (none posted)

graphicsmagick: multiple vulnerabilities

Package(s):graphicsmagick CVE #(s):CVE-2016-6823 CVE-2016-7101 CVE-2016-7515 CVE-2016-7517 CVE-2016-7519 CVE-2016-7522 CVE-2016-7524 CVE-2016-7528 CVE-2016-7529 CVE-2016-7531 CVE-2016-7533 CVE-2016-7537
Created:October 26, 2016 Updated:October 26, 2016
Description: From the openSUSE advisory:

- security update:

* CVE-2016-7529 [boo#1000399]

* CVE-2016-7528 [boo#1000434]

* CVE-2016-7515 [boo#1000689]

* CVE-2016-7517 [boo#1000693]

* CVE-2016-7519 [boo#1000695]

* CVE-2016-7522 [boo#1000698]

* CVE-2016-7524 [boo#1000700]

* CVE-2016-7531 [boo#1000704]

* CVE-2016-7533 [boo#1000707]

* CVE-2016-7537 [boo#1000711]

* CVE-2016-6823 [boo#1001066]

* CVE-2016-7101 [boo#1001221]

* do not divide by zero in WriteTIFFImage [boo#1002206]

* fix buffer overflow [boo#1002209]

Alerts:
openSUSE openSUSE-SU-2016:2770-1 ImageMagick 2016-11-10
openSUSE openSUSE-SU-2016:2671-1 ImageMagick 2016-10-28
openSUSE openSUSE-SU-2016:2641-1 GraphicsMagick 2016-10-26
openSUSE openSUSE-SU-2016:2644-1 GraphicsMagick 2016-10-26
openSUSE openSUSE-SU-2016:3091-1 ImageMagick 2016-12-12
openSUSE openSUSE-SU-2016:3089-1 ImageMagick 2016-12-12
openSUSE openSUSE-SU-2016:3060-1 GraphicsMagick 2016-12-08
SUSE SUSE-SU-2016:2964-1 ImageMagick 2016-12-01
Debian-LTS DLA-731-1 imagemagick 2016-12-02

Comments (none posted)

graphicsmagick: multiple vulnerabilities

Package(s):graphicsmagick CVE #(s):CVE-2015-8957 CVE-2015-8958 CVE-2016-7516 CVE-2016-7526 CVE-2016-7527
Created:October 26, 2016 Updated:October 26, 2016
Description: From the openSUSE advisory:

- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)

- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)

- CVE-2016-7516: Out of bounds problem in rle, pict, viff and sun files (bsc#1000692)

- CVE-2016-7526: out-of-bounds write in ./MagickCore/pixel-accessor.h (bsc#1000702)

- CVE-2016-7527: out of bound access in wpg file coder: (bsc#1000436)

Alerts:
openSUSE openSUSE-SU-2016:2770-1 ImageMagick 2016-11-10
openSUSE openSUSE-SU-2016:2671-1 ImageMagick 2016-10-28
openSUSE openSUSE-SU-2016:2641-1 GraphicsMagick 2016-10-26
SUSE SUSE-SU-2016:2964-1 ImageMagick 2016-12-01
Debian-LTS DLA-731-1 imagemagick 2016-12-02

Comments (none posted)

graphicsmagick: three vulnerabilities

Package(s):graphicsmagick CVE #(s):CVE-2016-8682 CVE-2016-8683 CVE-2016-8684
Created:October 26, 2016 Updated:October 26, 2016
Description: From the Mageia advisory:

Stack-based buffer overflow in ReadSCTImage (CVE-2016-8682).

Memory allocation failure in ReadPCXImage (CVE-2016-8683).

Memory allocation failure in MagickMalloc (CVE-2016-8684).

Alerts:
openSUSE openSUSE-SU-2016:2770-1 ImageMagick 2016-11-10
openSUSE openSUSE-SU-2016:2671-1 ImageMagick 2016-10-28
Debian-LTS DLA-683-1 graphicsmagick 2016-10-26
openSUSE openSUSE-SU-2016:2641-1 GraphicsMagick 2016-10-26
openSUSE openSUSE-SU-2016:2644-1 GraphicsMagick 2016-10-26
Mageia MGASA-2016-0357 graphicsmagick 2016-10-26
Debian DSA-3746-1 graphicsmagick 2016-12-24
openSUSE openSUSE-SU-2016:3060-1 GraphicsMagick 2016-12-08
SUSE SUSE-SU-2016:2964-1 ImageMagick 2016-12-01

Comments (none posted)

kdump: denial of service

Package(s):kdump CVE #(s):CVE-2016-5759
Created:October 24, 2016 Updated:October 26, 2016
Description: From the openSUSE advisory:

CVE-2016-5759: Use full path to dracut as argument to bash.

See the bug report for more information.

Alerts:
openSUSE openSUSE-SU-2016:2605-1 kdump 2016-10-24

Comments (none posted)

kernel: local privilege escalation (Dirty COW)

Package(s):kernel CVE #(s):CVE-2016-5195
Created:October 26, 2016 Updated:November 1, 2016
Description: The so-called "Dirty COW" vulnerability is a race condition in the kernel's memory-management code that is readily exploitable by a local attacker to run code in kernel mode. The bug is several years old, and numerous exploits exist. Fixes were shipped in the 4.8.3, 4.7.9, and 4.4.26 stable updates and will appear in the mainline in 4.9.
Alerts:
Oracle ELSA-2016-2766 kernel 2016-11-15
Oracle ELSA-2016-2574 kernel 2016-11-10
Mageia MGASA-2016-0364 kernel-tmb 2016-11-04
Slackware SSA:2016-305-01 kernel 2016-10-31
Red Hat RHSA-2016:2132-01 kernel 2016-11-01
Red Hat RHSA-2016:2133-01 kernel 2016-11-01
Red Hat RHSA-2016:2128-01 kernel 2016-10-31
Scientific Linux SLSA-2016:2124-1 kernel 2016-10-28
Oracle ELSA-2016-2124 kernel 2016-10-28
CentOS CESA-2016:2124 kernel 2016-10-28
Red Hat RHSA-2016:2127-01 kernel 2016-10-31
Red Hat RHSA-2016:2126-01 kernel 2016-10-31
Red Hat RHSA-2016:2124-01 kernel 2016-10-28
openSUSE openSUSE-SU-2016:2649-1 kernel 2016-10-26
Red Hat RHSA-2016:2118-01 kernel 2016-10-26
Red Hat RHSA-2016:2120-01 kernel 2016-10-27
Scientific Linux SLSA-2016:2105-1 kernel 2016-10-25
Oracle ELSA-2016-2105 kernel 2016-10-25
openSUSE openSUSE-SU-2016:2625-1 kernel 2016-10-25
CentOS CESA-2016:2105 kernel 2016-10-26
Red Hat RHSA-2016:2110-01 kernel-rt 2016-10-26
Red Hat RHSA-2016:2107-01 kernel-rt 2016-10-26
Red Hat RHSA-2016:2106-01 kernel 2016-10-26
Red Hat RHSA-2016:2105-01 kernel 2016-10-26
Ubuntu USN-3107-2 linux-raspi2 2016-10-24
Scientific Linux SLSA-2016:2098-1 kernel 2016-10-24
Oracle ELSA-2016-2098 kernel 2016-10-24
CentOS CESA-2016:2098 kernel 2016-10-25
Arch Linux ASA-201610-16 linux-grsec 2016-10-24
SUSE SUSE-SU-2016:2592-1 kernel 2016-10-21
SUSE SUSE-SU-2016:2596-1 kernel 2016-10-22
SUSE SUSE-SU-2016:2614-1 kernel 2016-10-24
SUSE SUSE-SU-2016:2585-1 kernel 2016-10-21
SUSE SUSE-SU-2016:2593-1 kernel 2016-10-21
Oracle ELSA-2016-3634 kernel 2.6.39 2016-10-22
Oracle ELSA-2016-3634 kernel 2.6.39 2016-10-22
Oracle ELSA-2016-3633 kernel 3.8.13 2016-10-22
Oracle ELSA-2016-3633 kernel 3.8.13 2016-10-22
Oracle ELSA-2016-3632 kernel 4.1.12 2016-10-22
Oracle ELSA-2016-3632 kernel 4.1.12 2016-10-22
openSUSE openSUSE-SU-2016:2584-1 kernel 2016-10-21
openSUSE openSUSE-SU-2016:2583-1 kernel 2016-10-21
Fedora FEDORA-2016-c3558808cd kernel 2016-10-23
Fedora FEDORA-2016-db4b75b352 kernel 2016-10-22
Arch Linux ASA-201610-11 linux-lts 2016-10-21
Arch Linux ASA-201610-14 kernel 2016-10-22
Mageia MGASA-2016-0347 kernel 2016-10-20
Ubuntu USN-3104-2 linux-ti-omap4 2016-10-19
Ubuntu USN-3106-4 linux-snapdragon 2016-10-19
Ubuntu USN-3106-3 linux-raspi2 2016-10-19
Ubuntu USN-3106-2 linux-lts-xenial 2016-10-19
Ubuntu USN-3105-2 linux-lts-trusty 2016-10-19
Ubuntu USN-3107-1 kernel 2016-10-19
Ubuntu USN-3106-1 kernel 2016-10-19
Ubuntu USN-3105-1 kernel 2016-10-19
Ubuntu USN-3104-1 kernel 2016-10-19
Debian-LTS DLA-670-1 kernel 2016-10-20
Debian DSA-3696-1 kernel 2016-10-19
Red Hat RHSA-2016:2098-01 kernel 2016-10-24
SUSE SUSE-SU-2016:3304-1 kernel 2016-12-30
SUSE SUSE-SU-2016:3069-1 kernel 2016-12-09

Comments (none posted)

kernel: three vulnerabilities

Package(s):kernel CVE #(s):CVE-2016-0823 CVE-2016-6327 CVE-2016-7117
Created:October 26, 2016 Updated:February 15, 2017
Description: From the CVE entries:

The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721. (CVE-2016-0823)

drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation. (CVE-2016-6327)

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. (CVE-2016-7117)

Alerts:
Ubuntu USN-3126-2 linux-ti-omap4 2016-11-11
Ubuntu USN-3126-1 kernel 2016-11-11
Red Hat RHSA-2016:2584-02 kernel-rt 2016-11-03
Red Hat RHSA-2016:2574-02 kernel 2016-11-03
openSUSE openSUSE-SU-2016:2625-1 kernel 2016-10-25
SUSE SUSE-SU-2017:0494-1 the Linux Kernel 2017-02-17
SUSE SUSE-SU-2017:0471-1 kernel 2017-02-15
Red Hat RHSA-2017:0270-01 kernel 2017-02-15
openSUSE openSUSE-SU-2017:0458-1 kernel 2017-02-13
openSUSE openSUSE-SU-2017:0456-1 kernel 2017-02-13
SUSE SUSE-SU-2017:0333-1 kernel 2017-01-30
Red Hat RHSA-2017:0215-01 kernel 2017-01-31
Red Hat RHSA-2017:0216-01 kernel 2017-01-31
Red Hat RHSA-2017:0217-01 kernel 2017-01-31
Red Hat RHSA-2017:0196-01 kernel 2017-01-26
CentOS CESA-2017:0086 kernel 2017-01-19
Scientific Linux SLSA-2017:0086-1 kernel 2017-01-17
Oracle ELSA-2017-0086 kernel 2017-01-17
Red Hat RHSA-2017:0113-01 kernel-rt 2017-01-17
Red Hat RHSA-2017:0091-01 kernel-rt 2017-01-17
Red Hat RHSA-2017:0086-01 kernel 2017-01-17
Red Hat RHSA-2017:0065-01 kernel 2017-01-17
Scientific Linux SLSA-2017:0036-1 kernel 2017-01-12
CentOS CESA-2017:0036 kernel 2017-01-12
Oracle ELSA-2017-0036 kernel 2017-01-10
Red Hat RHSA-2017:0036-01 kernel 2017-01-10
Red Hat RHSA-2017:0031-01 kernel 2017-01-10
SUSE SUSE-SU-2016:3304-1 kernel 2016-12-30
Oracle ELSA-2016-3655 kernel 4.1.12 2016-12-21
Oracle ELSA-2016-3655 kernel 4.1.12 2016-12-21
Oracle ELSA-2016-3656 kernel 3.8.13 2016-12-21
Oracle ELSA-2016-3656 kernel 3.8.13 2016-12-21
Oracle ELSA-2016-3657 kernel 2.6.39 2016-12-21
Oracle ELSA-2016-3657 kernel 2.6.39 2016-12-21
Oracle ELSA-2016-2962 kernel 2016-12-20
CentOS CESA-2016:2962 kernel 2016-12-20
Scientific Linux SLSA-2016:2962-1 kernel 2016-12-20
Red Hat RHSA-2016:2962-01 kernel 2016-12-20
Scientific Linux SLSA-2016:2574-2 kernel 2016-12-14
SUSE SUSE-SU-2016:3069-1 kernel 2016-12-09
openSUSE openSUSE-SU-2016:3021-1 kernel 2016-12-06
SUSE SUSE-SU-2016:2976-1 the Linux Kernel 2016-12-02
SUSE SUSE-SU-2016:2912-1 kernel 2016-11-25
Oracle ELSA-2016-3645 kernel 3.8.13 2016-11-21
Oracle ELSA-2016-3645 kernel 3.8.13 2016-11-21

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2016-8658
Created:October 24, 2016 Updated:October 26, 2016
Description: From the openSUSE advisory:

Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).

Alerts:
Mageia MGASA-2016-0372 kernel 2016-11-10
openSUSE openSUSE-SU-2016:2625-1 kernel 2016-10-25
openSUSE openSUSE-SU-2016:2583-1 kernel 2016-10-21
SUSE SUSE-SU-2017:0471-1 kernel 2017-02-15
SUSE SUSE-SU-2016:3304-1 kernel 2016-12-30
Ubuntu USN-3161-4 linux-snapdragon 2016-12-20
Ubuntu USN-3161-3 linux-raspi2 2016-12-20
openSUSE openSUSE-SU-2016:3021-1 kernel 2016-12-06
Ubuntu USN-3146-2 linux-lts-xenial 2016-11-30
Ubuntu USN-3145-2 linux-lts-trusty 2016-11-30
Ubuntu USN-3145-1 kernel 2016-11-30
Ubuntu USN-3146-1 kernel 2016-11-30
SUSE SUSE-SU-2016:2912-1 kernel 2016-11-25

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2015-8956 CVE-2016-7042 CVE-2016-7425
Created:October 20, 2016 Updated:December 1, 2016
Description: From the Debian advisory:

CVE-2015-8956: It was discovered that missing input sanitising in RFCOMM Bluetooth socket handling may result in denial of service or information leak.

CVE-2016-7042: Ondrej Kozina discovered that incorrect buffer allocation in the proc_keys_show() function may result in local denial of service.

CVE-2016-7425: Marco Grassi discovered a buffer overflow in the arcmsr SCSI driver which may result in local denial of service, or potentially, arbitrary code execution.

Alerts:
Ubuntu USN-3126-2 linux-ti-omap4 2016-11-11
Ubuntu USN-3128-3 linux-snapdragon 2016-11-11
Ubuntu USN-3129-2 linux-raspi2 2016-11-11
Ubuntu USN-3128-2 linux-lts-xenial 2016-11-11
Ubuntu USN-3127-2 linux-lts-trusty 2016-11-11
Ubuntu USN-3126-1 kernel 2016-11-11
Ubuntu USN-3127-1 kernel 2016-11-11
Ubuntu USN-3128-1 kernel 2016-11-11
Ubuntu USN-3129-1 kernel 2016-11-11
Red Hat RHSA-2016:2584-02 kernel-rt 2016-11-03
Red Hat RHSA-2016:2574-02 kernel 2016-11-03
openSUSE openSUSE-SU-2016:2625-1 kernel 2016-10-25
openSUSE openSUSE-SU-2016:2583-1 kernel 2016-10-21
Ubuntu USN-3104-2 linux-ti-omap4 2016-10-19
Ubuntu USN-3106-4 linux-snapdragon 2016-10-19
Ubuntu USN-3106-3 linux-raspi2 2016-10-19
Ubuntu USN-3106-2 linux-lts-xenial 2016-10-19
Ubuntu USN-3105-2 linux-lts-trusty 2016-10-19
Ubuntu USN-3107-1 kernel 2016-10-19
Ubuntu USN-3106-1 kernel 2016-10-19
Ubuntu USN-3105-1 kernel 2016-10-19
Ubuntu USN-3104-1 kernel 2016-10-19
Debian-LTS DLA-670-1 kernel 2016-10-20
Debian DSA-3696-1 kernel 2016-10-19
SUSE SUSE-SU-2017:0494-1 the Linux Kernel 2017-02-17
SUSE SUSE-SU-2017:0471-1 kernel 2017-02-15
SUSE SUSE-SU-2017:0333-1 kernel 2017-01-30
SUSE SUSE-SU-2017:0181-1 kernel 2017-01-17
Oracle ELSA-2017-3508 kernel 4.1.12 2017-01-12
Oracle ELSA-2017-3508 kernel 4.1.12 2017-01-12
Oracle ELSA-2017-3509 kernel 3.8.13 2017-01-12
Oracle ELSA-2017-3509 kernel 3.8.13 2017-01-12
Oracle ELSA-2017-3510 kernel 2.6.39 2017-01-12
Oracle ELSA-2017-3510 kernel 2.6.39 2017-01-12
SUSE SUSE-SU-2016:3304-1 kernel 2016-12-30
Ubuntu USN-3161-4 linux-snapdragon 2016-12-20
Ubuntu USN-3161-3 linux-raspi2 2016-12-20
Ubuntu USN-3162-2 linux-raspi2 2016-12-20
Scientific Linux SLSA-2016:2574-2 kernel 2016-12-14
SUSE SUSE-SU-2016:3069-1 kernel 2016-12-09
openSUSE openSUSE-SU-2016:3061-1 kernel 2016-12-08
openSUSE openSUSE-SU-2016:3050-1 kernel 2016-12-08
openSUSE openSUSE-SU-2016:3058-1 kernel 2016-12-08
Mageia MGASA-2016-0412 kernel-tmb-4.4.32 2016-12-07
Mageia MGASA-2016-0411 kernel-linus-4.4.32 2016-12-07
openSUSE openSUSE-SU-2016:3021-1 kernel 2016-12-06
SUSE SUSE-SU-2016:2976-1 the Linux Kernel 2016-12-02
Ubuntu USN-3144-2 linux-ti-omap4 2016-11-30
Ubuntu USN-3146-2 linux-lts-xenial 2016-11-30
Ubuntu USN-3145-2 linux-lts-trusty 2016-11-30
Ubuntu USN-3144-1 kernel 2016-11-30
Ubuntu USN-3145-1 kernel 2016-11-30
Ubuntu USN-3146-1 kernel 2016-11-30
Ubuntu USN-3147-1 kernel 2016-11-30
SUSE SUSE-SU-2016:2912-1 kernel 2016-11-25
Mageia MGASA-2016-0401 kernel-4.4.32 2016-11-26
Oracle ELSA-2016-3646 kernel 2.6.39 2016-11-21
Oracle ELSA-2016-3646 kernel 2.6.39 2016-11-21
Oracle ELSA-2016-3645 kernel 3.8.13 2016-11-21
Oracle ELSA-2016-3645 kernel 3.8.13 2016-11-21
Oracle ELSA-2016-3644 kernel 4.1.12 2016-11-21
Oracle ELSA-2016-3644 kernel 4.1.12 2016-11-21

Comments (none posted)

libX11: denial of service

Package(s):libX11 CVE #(s):CVE-2016-7942 CVE-2016-7943
Created:October 24, 2016 Updated:October 27, 2016
Description: From the openSUSE advisory:

insufficient validation of data from the X server allowed out of boundary memory read (bsc#1002991)

Alerts:
Slackware SSA:2016-305-02 libX11 2016-10-31
Debian-LTS DLA-684-1 libx11 2016-10-27
openSUSE openSUSE-SU-2016:2600-1 X 2016-10-24
openSUSE openSUSE-SU-2016:3034-1 X 2016-12-07

Comments (none posted)

mozilla: two vulnerabilities

Package(s):firefox seamonkey CVE #(s):CVE-2016-5287 CVE-2016-5288
Created:October 26, 2016 Updated:November 9, 2016
Description: From the openSUSE advisory:

* CVE-2016-5287: Crash in nsTArray_base (bsc#1006475)

* CVE-2016-5288: Web content can read cache entries (bsc#1006476)

Alerts:
Fedora FEDORA-2016-3f235e39d0 firefox 2016-11-08
openSUSE openSUSE-SU-2016:2735-1 firefox 2016-11-05
Fedora FEDORA-2016-fa03795843 firefox 2016-11-06
Ubuntu USN-3111-1 firefox 2016-10-27
openSUSE openSUSE-SU-2016:2639-1 firefox 2016-10-26

Comments (none posted)

mysql: multiple unspecified vulnerabilities

Package(s):mysql CVE #(s):CVE-2016-5584 CVE-2016-7440
Created:October 25, 2016 Updated:November 16, 2016
Description: From the Ubuntu advisory:

Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.5.53 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 16.04 LTS and Ubuntu 16.10 have been updated to MySQL 5.7.16.

MySQL 5.5.53 release notes

MySQL 5.7.16 release notes

Alerts:
Debian-LTS DLA-708-1 mysql-5.5 2016-11-16
SUSE SUSE-SU-2016:2780-1 mysql 2016-11-12
openSUSE openSUSE-SU-2016:2788-1 mysql-community-server 2016-11-12
Debian DSA-3711-1 mariadb-10.0 2016-11-11
openSUSE openSUSE-SU-2016:2769-1 mysql-community-server 2016-11-10
Mageia MGASA-2016-0371 mariadb 2016-11-09
Debian DSA-3706-1 mysql-5.5 2016-11-07
Slackware SSA:2016-305-03 mariadb 2016-10-31
Ubuntu USN-3109-1 mysql-5.5, mysql-5.7 2016-10-25
Gentoo 201701-01 mariadb 2017-01-01
openSUSE openSUSE-SU-2016:3028-1 mariadb 2016-12-06
openSUSE openSUSE-SU-2016:3025-1 mariadb 2016-12-06
SUSE SUSE-SU-2016:2932-1 mariadb 2016-11-28
SUSE SUSE-SU-2016:2933-1 mariadb 2016-11-28

Comments (none posted)

nginx: privilege escalation

Package(s):nginx CVE #(s):CVE-2016-1247
Created:October 26, 2016 Updated:January 16, 2017
Description: From the Debian advisory:

Dawid Golunski reported the nginx web server packages in Debian suffered from a privilege escalation vulnerability (www-data to root) due to the way log files are handled. This security update changes ownership of the /var/log/nginx directory root. In addition, /var/log/nginx has to be made accessible to local users, and local users may be able to read the log files themselves local until the next logrotate invocation.

Alerts:
Ubuntu USN-3114-2 nginx 2016-10-27
Debian DSA-3701-2 nginx 2016-10-28
Ubuntu USN-3114-1 nginx 2016-10-25
Debian DSA-3701-1 nginx 2016-10-25
Arch Linux ASA-201701-24 nginx-mainline 2017-01-15
Arch Linux ASA-201701-23 nginx 2017-01-15
Gentoo 201701-22 nginx 2017-01-11

Comments (none posted)

nspr, nss: information disclosure

Package(s):nspr nss CVE #(s):
Created:October 26, 2016 Updated:October 26, 2016
Description: From the Debian LTS advisory:

The Network Security Service (NSS) libraries uses environment variables to configure lots of things, some of which refer to file system locations. Others can degrade the operation of NSS in various ways, forcing compatibility modes and so on.

Previously, these environment variables were not ignored SUID binaries. This version of NetScape Portable Runtime Library (NSPR) introduce a new API, PR_GetEnVSecure, to address this.

Alerts:
Debian-LTS DLA-677-1 nss 2016-10-25
Debian-LTS DLA-676-1 nspr 2016-10-25

Comments (none posted)

openslp: code execution

Package(s):openslp CVE #(s):CVE-2016-7567
Created:October 21, 2016 Updated:October 26, 2016
Description: From the Mageia advisory:

A memory corruption bug was present in openslp due to lack of bounds checking in SLPFoldWhiteSpace() (CVE-2016-7567).

Alerts:
openSUSE openSUSE-SU-2016:2712-1 openslp 2016-11-03
Mageia MGASA-2016-0348 openslp 2016-10-21

Comments (none posted)

perl-Image-Info: information disclosure

Package(s):perl-Image-Info CVE #(s):CVE-2016-9181
Created:October 26, 2016 Updated:November 4, 2016
Description: From the Red Hat bugzilla:

The Image::Info package makes no precautions against external entity expansion in SVG files. A crafted file could cause information disclosure or denial of service.

See also the CVE assignment email.

Alerts:
Fedora FEDORA-2016-f8fd3891f8 perl-Image-Info 2016-10-25
Fedora FEDORA-2016-be779371b4 perl-Image-Info 2016-10-25

Comments (none posted)

php: multiple vulnerabilities

Package(s):php CVE #(s):CVE-2016-9137
Created:October 24, 2016 Updated:November 21, 2016
Description: PHP 5.6.27 fixes multiple vulnerabilities. See the PHP changelog for details.

One of these issues was assigned CVE-2016-9137.

Alerts:
Slackware SSA:2016-305-04 php 2016-10-31
Mageia MGASA-2016-0355 php 2016-10-24
Debian DSA-3698-1 php5 2016-10-24
Fedora FEDORA-2016-0729e59542 php 2016-10-22
Fedora FEDORA-2016-7a30285647 php 2016-10-22
Ubuntu USN-3196-1 php5 2017-02-14
openSUSE openSUSE-SU-2016:3092-1 php7 2016-12-12
openSUSE openSUSE-SU-2016:3095-1 php5 2016-12-12
openSUSE openSUSE-SU-2016:2866-1 php5 2016-11-21

Comments (none posted)

php-pecl-zip: multiple vulnerabilities

Package(s):php-pecl-zip CVE #(s):
Created:October 24, 2016 Updated:October 26, 2016
Description: From the Fedora advisory:

**Version 1.13.5** - Fixed bug php#72660 (NULL Pointer dereference in zend_virtual_cwd). (Laruence) - Fixed bug php#68302 (impossible to compile php with zip support). (cmb) - Fixed bug php#70752 (Depacking with wrong password leaves 0 length files). (cmb)

Alerts:
Fedora FEDORA-2016-0312cf1dcd php-pecl-zip 2016-10-22
Fedora FEDORA-2016-b9cb75981a php-pecl-zip 2016-10-22

Comments (none posted)

potrace: multiple vulnerabilities

Package(s):potrace CVE #(s):CVE-2016-8694 CVE-2016-8695 CVE-2016-8696 CVE-2016-8697 CVE-2016-8698 CVE-2016-8699 CVE-2016-8700 CVE-2016-8701 CVE-2016-8702 CVE-2016-8703
Created:October 26, 2016 Updated:October 26, 2016
Description: From the Debian LTS advisory:

CVE-2016-8694, CVE-2016-8695, CVE-2016-8696: Multiple NULL pointer dereferences in bm_readbody_bmp. This bug was discovered by Agostino Sarubbo of Gentoo.

CVE-2016-8697: Division by zero in bm_new. This bug was discovered by Agostino Sarubbo of Gentoo.

CVE-2016-8698, CVE-2016-8699, CVE-2016-8700, CVE-2016-8701, CVE-2016-8702, CVE-2016-8703: Multiple heap-based buffer overflows in bm_readbody_bmp. This bug was discovered by Agostino Sarubbo of Gentoo.

Alerts:
Debian-LTS DLA-675-1 potrace 2016-10-26

Comments (none posted)

qemu: denial of service

Package(s):qemu CVE #(s):CVE-2016-7155
Created:October 24, 2016 Updated:October 26, 2016
Description: From the SUSE advisory:

In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858)

Alerts:
Ubuntu USN-3125-1 qemu, qemu-kvm 2016-11-09
openSUSE openSUSE-SU-2016:2642-1 qemu 2016-10-26
SUSE SUSE-SU-2016:2589-1 qemu 2016-10-21

Comments (none posted)

qemu: three vulnerabilities

Package(s):qemu CVE #(s):CVE-2016-8577 CVE-2016-8578 CVE-2016-8669
Created:October 26, 2016 Updated:October 26, 2016
Description: From the Debian LTS advisory:

CVE-2016-8577: Quick Emulator (Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while doing a I/O read operation in v9fs_read() routine.

CVE-2016-8578: Quick Emulator (Qemu) built with the virtio-9p back-end support is vulnerable to a null pointer dereference issue. It could occur while doing an I/O vector unmarshalling operation in v9fs_iov_vunmarshal() routine.

CVE-2016-8669: Quick Emulator (Qemu) built with the 16550A UART emulation support is vulnerable to a divide by zero issue. It could occur while updating serial device parameters in 'serial_update_parameters'.

Alerts:
Fedora FEDORA-2016-da6b1d277b xen 2016-11-10
Ubuntu USN-3125-1 qemu, qemu-kvm 2016-11-09
Fedora FEDORA-2016-0d1a8ee35b xen 2016-11-10
Debian-LTS DLA-679-1 qemu-kvm 2016-10-25
Debian-LTS DLA-678-1 qemu 2016-10-25
Fedora FEDORA-2017-12394e2cc7 qemu 2017-01-25
Fedora FEDORA-2017-b953d4d3a4 qemu 2017-01-20
openSUSE openSUSE-SU-2017:0008-1 xen 2017-01-02
openSUSE openSUSE-SU-2017:0007-1 xen 2017-01-02
SUSE SUSE-SU-2016:3273-1 xen 2016-12-27
openSUSE openSUSE-SU-2016:3237-1 qemu 2016-12-22
SUSE SUSE-SU-2016:3174-1 xen 2016-12-16
SUSE SUSE-SU-2016:3156-1 xen 2016-12-14
openSUSE openSUSE-SU-2016:3134-1 xen 2016-12-14
openSUSE openSUSE-SU-2016:3103-1 qemu 2016-12-12
SUSE SUSE-SU-2016:3083-1 xen 2016-12-12
SUSE SUSE-SU-2016:3067-1 xen 2016-12-09
SUSE SUSE-SU-2016:3044-1 xen 2016-12-07
SUSE SUSE-SU-2016:2988-1 qemu 2016-12-02
SUSE SUSE-SU-2016:2936-1 qemu 2016-11-29
SUSE SUSE-SU-2016:2902-1 kvm 2016-11-24
Gentoo 201611-11 qemu 2016-11-19
Fedora FEDORA-2016-7b6fbff620 xen 2016-11-19

Comments (none posted)

virtualbox: multiple unspecified vulnerabilities

Package(s):virtualbox CVE #(s):CVE-2016-5501 CVE-2016-5538 CVE-2016-5605 CVE-2016-5608 CVE-2016-5610 CVE-2016-5611 CVE-2016-5613
Created:October 25, 2016 Updated:January 24, 2017
Description: From the NVD entries:

CVE-2016-5501: Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5538.

CVE-2016-5538: Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5501.

CVE-2016-5605: Unspecified vulnerability in the Oracle VM VirtualBox component before 5.1.4 in Oracle Virtualization allows remote attackers to affect confidentiality and integrity via vectors related to VRDE.

CVE-2016-5608: Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect availability via vectors related to Core, a different vulnerability than CVE-2016-5613.

CVE-2016-5610: Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core.

CVE-2016-5611: Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality via vectors related to Core.

CVE-2016-5613: Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect availability via vectors related to Core, a different vulnerability than CVE-2016-5608.

Alerts:
openSUSE openSUSE-SU-2016:2623-1 virtualbox 2016-10-25
openSUSE openSUSE-SU-2017:0270-1 virtualbox 2017-01-24
Gentoo 201612-27 virtualbox 2016-12-12
Mageia MGASA-2016-0408 virtualbox 2016-12-05
openSUSE openSUSE-SU-2016:2935-1 virtualbox 2016-11-28

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds