lists.archlinux.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

Arch-security

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
arch-security@lists.archlinux.org

December 2015

  • 13 participants
  • 24 discussions
[arch-security] [ASA-201512-2] openssl lib32-openssl: multiple issues
by Christian Rebischke 05 Dec '15

05 Dec '15
Arch Linux Security Advisory ASA-201512-2 ========================================= Severity: High Date : 2015-12-05 CVE-ID : CVE-2015-3193 CVE-2015-3194 CVE-2015-3195 CVE-2015-3196 CVE-2015-1794 Package : openssl lib32-openssl Type : multiple issues Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The packages openssl and lib32-openssl before version 1.0.2.e-1 are vulnerable to multiple issues including memory leaks, denial of service, double free. If you use DHE there is a possibility that organizations with enough system resources can guess your private key. Resolution ========== Upgrade to 1.0.2.e-1. # pacman -Syu "openssl>=1.0.2.e-1" If you use lib32-openssl it is strongly recommended to upgrade this package as well. # pacman -Syu "lib32-openssl>=1.0.2.e-1" The problems have been fixed upstream in version 1.0.2.e. Workaround ========== None. Description =========== - CVE-2015-3193 (insecure private key in connection with DHE) There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites.[1] - CVE-2015-3194 (denial of service) The signature verification routines will crash with a NULL pointer dereference if presented with an ASN.1 signature using the RSA PSS algorithm and absent mask generation function parameter. Since these routines are used to verify certificate signature algorithms this can be used to crash any certificate verification operation and exploited in a DoS attack. Any application which performs certificate verification is vulnerable including OpenSSL clients and servers which enable client authentication.[2] - CVE-2015-3195 (memory leaks) When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak memory. This structure is used by the PKCS#7 and CMS routines so any application which reads PKCS#7 or CMS data from untrusted sources is affected. SSL/TLS is not affected.[3] - CVE-2015-3196 (double free) If PSK identity hints are received by a multi-threaded client then the values are wrongly updated in the parent SSL_CTX structure. This can result in a race condition potentially leading to a double free of the identify hint data.[4] - CVE-2015-1794 (denial of service) If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to 0 then a seg fault can occur leading to a possible denial of service attack.[5] Impact ====== A remote attacker is possible to guess the private key (only when DHE is used) with enough resources (e.g NSA/GHCQ), crash openssl (denial of service) and make use of memory leaks.[6] References ========== [1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3193 [2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3194 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3195 [4] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3196 [5] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1794 [6] https://www.openssl.org/news/secadv/20151203.txt
1 0
0 0
Re: [arch-security] mailinglist time issues (at discussion 'strange netstat connections after having opened Firefox')
by Sebastian 05 Dec '15

05 Dec '15
Hey there, On 2015-12-04 22:52, respiranto wrote: > On 12/05/2015 12:26 AM, Elmar Stellnberger wrote: >> [...] > > Is it possible, that your mailserver has some time issues? > On my machine, it is currently 2015-12-04, 21:52:05 UTC. > My timezone is UTC+1, so 2015-12-05, 12:26 is definitely in the future. > There are two other such mails: > - today, 21:58 UTC > - today, 22:46 UTC > > Or is my mailserver or client somehow responsible for this strange > time discrepancy? > It is shown by both Icedove and Mutt. Same for me. Client is Roundcube Webmail. The mails are out of order and I guess the time is, too (though I didn't look out for "future" mails). I'm also in UTC+1. Greetings, Sebastian -- A great many of today's security technologies are "secure" only because no-one has ever bothered attacking them. -- Peter Gutmann
1 0
0 0
Re: [arch-security] strange netstat connections after having opened Firefox
by cspence@unomaha.edu 04 Dec '15

04 Dec '15
I may also suggest leveraging auditd to track what processes are attempting to establish network connections if you want to specifically pin down the source of all your closed connections. Note that this will eat up a lot of log space quickly if you use it for more than a reasonable span of time. At the very least, this will help you determine what network activity is part of the expected baseline if hardening and monitoring is your goal. > > Thanks for the provided material and info, Jonathan; > > Unfortunately I can not prevent Firefox entirely from connecting to > apparently random web addresses once I open it; not even with the > settings (malware, phishing) you have recommended me to try; not even > with disabling all addons. Three servers that were contacted while/upon > an about:blank invocation:
1 0
0 0
[arch-security] [ASA-201512-1] chromium: multiple issues
by Remi Gacogne 02 Dec '15

02 Dec '15
Arch Linux Security Advisory ASA-201512-1 ========================================= Severity: Critical Date : 2015-12-02 CVE-ID : CVE-2015-6764 CVE-2015-6765 CVE-2015-6766 CVE-2015-6767 CVE-2015-6768 CVE-2015-6769 CVE-2015-6770 CVE-2015-6771 CVE-2015-6772 CVE-2015-6773 CVE-2015-6774 CVE-2015-6775 CVE-2015-6776 CVE-2015-6777 CVE-2015-6778 CVE-2015-6779 CVE-2015-6780 CVE-2015-6781 CVE-2015-6782 CVE-2015-6784 CVE-2015-6785 CVE-2015-6786 CVE-2015-6787 Package : chromium Type : multiple issues Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package chromium before version 47.0.2526.73-1 is vulnerable to multiple issues including but not limited to various memory corruption, cross-origin bypass and scheme bypass. Resolution ========== Upgrade to 47.0.2526.73-1. # pacman -Syu "chromium>=47.0.2526.73-1" The problem has been fixed upstream in version 47.0.2526.73. Workaround ========== None. Description =========== - CVE-2015-6764: Out of bounds access in v8. Credit to Guang Gong of Qihoo 360 via pwn2own. - CVE-2015-6765, CVE-2015-6766, CVE-2015-6767: Use-after-free in AppCache. - CVE-2015-6768, CVE-2015-6770, CVE-2015-6772: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. - CVE-2015-6769: Cross-origin bypass in core. Credit to Mariusz Mlynski. - CVE-2015-6771: Out of bounds access in v8. - CVE-2015-6773: Out of bounds access in Skia. Credit to cloudfuzzer. - CVE-2015-6774: Use-after-free in Extensions. - CVE-2015-6775: Type confusion in PDFium. Credit to Atte Kettunen of OUSPG. - CVE-2015-6776: Out of bounds access in PDFium. Credit to Hanno Böck. - CVE-2015-6777: Use-after-free in DOM. Credit to Long Liu of Qihoo 360Vulcan Team. - CVE-2015-6778: Out of bounds access in PDFium. Credit to Karl Skomski. - CVE-2015-6779: Scheme bypass in PDFium. Credit to Til Jasper Ullrich. - CVE-2015-6780: Use-after-free in Infobars. Credit to Khalil Zhani. - CVE-2015-6781: Integer overflow in Sfntly. Credit to miaubiz. - CVE-2015-6782: Content spoofing in Omnibox. Credit to Luan Herrera. - CVE-2015-6784: Escaping issue in saved pages. Credit to Inti De Ceukelaire. - CVE-2015-6785: Wildcard matching issue in CSP. Credit to Michael Ficarra / Shape Security. - CVE-2015-6786: Scheme bypass in CSP. Credit to Michael Ficarra / Shape Security. - CVE-2015-6787: Various fixes from internal audits, fuzzing and other initiatives. Impact ====== A remote attacker might be able to bypass CSP and cross-origin policies, or execute arbitrary code on the affected host. References ========== http://googlechromereleases.blogspot.fr/2015/12/stable-channel-update.html
1 0
0 0
  • ← Newer
  • 1
  • 2
  • 3
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.