Debian Linux Security Advisory 3439-1 – Two vulnerabilities were discovered in Prosody, a lightweight Jabber/XMPP server.
Monthly Archives: January 2016
Red Hat Security Advisory 2016-0018-01
Red Hat Security Advisory 2016-0018-01 – OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A flaw was discovered in the OpenStack Compute snapshot feature when using the libvirt driver. A compute user could overwrite an attached instance disk with a malicious header specifying a backing file, and then request a snapshot, causing a file from the compute host to be leaked. This flaw only affects LVM or Ceph setups, or setups using filesystem storage with “use_cow_images = False”.
Debian Security Advisory 3438-1
Debian Linux Security Advisory 3438-1 – It was discovered that unplugging one of the monitors in a multi-monitor setup can cause xscreensaver to crash. Someone with physical access to a machine could use this problem to bypass a locked session.
Debian Security Advisory 3437-1
Debian Linux Security Advisory 3437-1 – Karthikeyan Bhargavan and Gaetan Leurent at INRIA discovered a flaw in the TLS 1.2 protocol which could allow the MD5 hash function to be used for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker could exploit this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.
Debian Security Advisory 3440-1
Debian Linux Security Advisory 3440-1 – When sudo is configured to allow a user to edit files under a directory that they can already write to without using sudo, they can actually edit (read and write) arbitrary files. Daniel Svartman reported that a configuration like this might be introduced unintentionally if the editable files are specified using wildcards, for example.
Debian Security Advisory 3441-1
Debian Linux Security Advisory 3441-1 – David Golden of MongoDB discovered that File::Spec::canonpath() in Perl returned untainted strings even if passed tainted input. This defect undermines taint propagation, which is sometimes used to ensure that unvalidated user input does not reach sensitive code.
Debian Security Advisory 3436-1
Debian Linux Security Advisory 3436-1 – Karthikeyan Bhargavan and Gaetan Leurent at INRIA discovered a flaw in the TLS 1.2 protocol which could allow the MD5 hash function to be used for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker could exploit this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.
Red Hat Security Advisory 2016-0017-01
Red Hat Security Advisory 2016-0017-01 – OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A flaw was discovered in the OpenStack Compute snapshot feature when using the libvirt driver. A compute user could overwrite an attached instance disk with a malicious header specifying a backing file, and then request a snapshot, causing a file from the compute host to be leaked. This flaw only affects LVM or Ceph setups, or setups using filesystem storage with “use_cow_images = False”.
GDCM 2.6.0 / 2.6.1 Out-Of-Bounds Read
GDCM versions 2.6.0 and 2.6.1 suffer from an out-of-bounds read due to missing checks. The vulnerability occurs during the decoding of JPEG-LS images when the dimensions of the embedded JPEG-LS image (as specified in the JPEG headers) are smaller than the ones of the selected region (set by gdcm::ImageRegionReader::SetRegion and usually based on DICOM header values).
GDCM 2.6.0 / 2.6.1 Integer Overflow
GDCM versions 2.6.0 and 2.6.1 suffer from an integer overflow vulnerability which leads to a buffer overflow and potentially to remote code execution.