Monthly Archives: August 2016
Australian Census Attacked By Hackers
Hitler Ransomware Goose-Steps Onto PCs
Ubuntu Security Notice USN-3052-1
Ubuntu Security Notice 3052-1 – It was discovered that the keyring implementation in the Linux kernel did not ensure a data structure was initialized before referencing it after an error condition occurred. A local attacker could use this to cause a denial of service. Kangjie Lu discovered an information leak in the netlink implementation o f the Linux kernel. A local attacker could use this to obtain sensitive information from kernel memory. Various other issues were also addressed.
Ubuntu Security Notice USN-3049-1
Ubuntu Security Notice 3049-1 – Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to cause a denial of service or possibly execute arbitrary code with administrative privileges. Vitaly Kuznetsov discovered that the Linux kernel did not properly suppress hugetlbfs support in X86 paravirtualized guests. An attacker in the guest Various other issues were also addressed.
Ubuntu Security Notice USN-3053-1
Ubuntu Security Notice 3053-1 – A missing permission check when settings ACLs was discovered in nfsd. A local user could exploit this flaw to gain access to any file by setting an ACL. It was discovered that the keyring implementation in the Linux kernel did not ensure a data structure was initialized before referencing it after an error condition occurred. A local attacker could use this to cause a denial of service. Various other issues were also addressed.
Ubuntu Security Notice USN-3055-1
Ubuntu Security Notice 3055-1 – Ben Hawkes discovered an integer overflow in the Linux netfilter implementation. On systems running 32 bit kernels, a local unprivileged attacker could use this to cause a denial of service or possibly execute arbitrary code with administrative privileges. It was discovered that the keyring implementation in the Linux kernel did not ensure a data structure was initialized before referencing it after an error condition occurred. A local attacker could use this to cause a denial of service. Various other issues were also addressed.
Apple Says Banks Can't Touch iPhone NFC Without Harming Security
Require Login – Moderately Critical – Multiple vulnerabilities – SA-CONTRIB-2016-045
- Advisory ID: SA-CONTRIB-2016-045
- Project: Require Login (third-party module)
- Version: 7.x, 8.x
- Date: 2016-August-10
- Security risk: 13/25 ( Moderately Critical) AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:All
- Vulnerability: Cross Site Scripting, Access bypass
Description
This module enables you to restrict site access without using user roles or permissions.
The module does not sufficiently escape some of its settings, and, in some cases, allows malicious users to bypass the protection offered by Require Login.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Require Login 7.x-2.x versions prior to 7.x-2.4
- Require Login 8.x-1.x versions prior to 8.x-1.8
Drupal core is not affected. If you do not use the contributed Require Login module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Require Login module for Drupal 7.x, upgrade to Require Login 7.x-2.4
- If you use the Require Login module for Drupal 8.x, upgrade to Require Login 8.x-1.8
Also see the Require Login project page.
Reported by
- Ivo Van Geertruyen of the Drupal Security Team
Fixed by
- Robert Phillips the module maintainer
- Ivo Van Geertruyen of the Drupal Security Team
Coordinated by
- Ivo Van Geertruyen of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
CVE-2013-7458
linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.