USN-2600-2: Linux kernel regression

Ubuntu Security Notice USN-2600-2

8th May, 2015

linux regression

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10

Summary

USN-2600-1 Introduced a regression in the Linux kernel.

Software description

  • linux
    – Linux kernel

Details

USN-2600-1 fixed vulnerabilities in the Linux kernel, however an unrelated
regression in the auditing of some path names was introduced. Due to the
regression the system could crash under certain conditions.

This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

A race condition between chown() and execve() was discovered in the Linux
kernel. A local attacker could exploit this race by using chown on a
setuid-user-binary to gain administrative privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
linux-image-3.16.0-37-powerpc64-emb

3.16.0-37.51
linux-image-3.16.0-37-lowlatency

3.16.0-37.51
linux-image-3.16.0-37-powerpc64-smp

3.16.0-37.51
linux-image-3.16.0-37-generic-lpae

3.16.0-37.51
linux-image-3.16.0-37-powerpc-smp

3.16.0-37.51
linux-image-3.16.0-37-generic

3.16.0-37.51
linux-image-3.16.0-37-powerpc-e500mc

3.16.0-37.51

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

LP: 1450442

CVE-2014-3440 – Symantec Critical System Protection RCE

Posted by Balint Varga-Perke on May 09

Silent Signal Security Advisory
===============================

Title: Symantec Critical System Protection Remote Code Execution
CVE: CVE-2014-3440
CVSSv2: 9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Status: Public
Date: 2015-05-05

## Software description

According to the vendor Symantec Critical System Protection provides
policy-based behavior control and detection for server and desktop
computers. Symantec Critical System Protection includes management…

WordPress Twenty Fifteen Theme – DOM XSS Vulnerability – CVE-2015-3429

Posted by Onur Yilmaz on May 09

Information
——————–
Advisory by Netsparker.
Name: DOM XSS Vulnerability in Twenty Fifteen WordPress Theme
Affected Software : WordPress
Affected Versions: 4.2.1 and probably below
Vendor Homepage : https://wordpress.org/ and
https://wordpress.org/themes/twentyfifteen/
Vulnerability Type : DOM based Cross-site Scripting
Severity : Important
CVE-ID: CVE-2015-3429
Netsparker Advisory Reference : NS-15-007

Description…

WordPress Roomcloud plugin v1.1(rev @1115307) XSS vulnerability

Posted by Nitin Venkatesh on May 09

## Details

# Title: Unsanitized parameters in WordPress Roomcloud plugin v1.1(rev
@1115307) allows Cross-site Scripting
# Submitter: Nitin Venkatesh <venkatesh [dot] nitin [at] gmail [dot] com>
# Product: WordPress Roomcloud plugin
# Product URL: https://wordpress.org/plugins/roomcloud
# Vulnerability Type: Cross-site Scripting [CWE-79]
# Affected Versions: Tested on v1.1 (revision @1115307)
# Fixed Version: v1.1 (revision @1117499)
# Link…

DAVOSET v.1.2.4

Posted by MustLive on May 09

Hello participants of Mailing List.

After making public release of DAVOSET
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2013-June/008850.html),
I’ve made next update of the software. DAVOSET v.1.2.4 was released – DDoS
attacks via other sites execution tool (http://websecurity.com.ua/davoset/).

Video demonstration of DAVOSET: http://www.youtube.com/watch?v=RKi35-f346I

GitHub: https://github.com/MustLive/DAVOSET

Capstone disassembly framework 3.0.3 is out!

Posted by Nguyen Anh Quynh on May 09

Greetings,

Version 3.0.3 of Capstone disassembly framework if officially out!

I would like to dedicate this release to Prof. Yoshiyasu Takefuji, my
former advisor, who is turning 60 years old this year 2015!

For those who do not know, Capstone is an open source multi-arch,
multi-platform disassembly engine. Find more about our project at
http://capstone-engine.org

Summary of important changes in v3.0.3:

– Fixed a segfault of X86 engine.
-…