lists.archlinux.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

Arch-security

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
arch-security@lists.archlinux.org

  • 1905 discussions
[arch-security] [Arch Linux Security Advisory ASA-201412-5] antiword: buffer overflow
by Levente Polyak 04 Dec '14

04 Dec '14
Arch Linux Security Advisory ASA-201412-5 ========================================= Severity: High Date : 2014-12-04 CVE-ID : CVE-2014-8123 Package : antiword Type : buffer overflow Remote : No Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package antiword before version 0.37-5 is suffering from a buffer overflow vulnerability that may lead to arbitrary code execution. Resolution ========== Upgrade to 0.37-5. # pacman -Syu "antiword>=0.37-5" The problem has not yet been fixed upstream but a local patch is applied. Workaround ========== None. Description =========== The program antiword is suffering from a buffer overflow within atPPSlist[].szName[] that may lead to denial of service or arbitrary code execution. Impact ====== An attacker is able to craft a special file hat triggers the buffer overflow leading to denial of service or arbitrary code execution. References ========== http://seclists.org/oss-sec/2014/q4/874 https://access.redhat.com/security/cve/CVE-2014-8123 https://bugs.archlinux.org/task/42982
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201412-4] graphviz: format string vulnerability
by Remi Gacogne 03 Dec '14

03 Dec '14
Arch Linux Security Advisory ASA-201412-4 ========================================= Severity: Medium Date : 2014-12-03 CVE-ID : CVE-2014-9157 Package : graphviz Type : format string vulnerability Remote : No Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package graphviz before version 2.38.0-3 is vulnerable to a format string vulnerability. Resolution ========== Upgrade to 2.38.0-3. # pacman -Syu "graphviz>=2.38.0-3" The problem has been fixed upstream, but there has been no release including the fix yet. Workaround ========== None. Description =========== A format string vulnerability has been found in the error reporting part of the parser used by graphviz. Impact ====== An attacker might be able to execute arbitrary code by supplying a specially crafted file to graphviz. References ========== https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9157 http://seclists.org/oss-sec/2014/q4/872 https://bugs.archlinux.org/task/42983 https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe4…
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201412-3] firefox: multiple issues
by Remi Gacogne 03 Dec '14

03 Dec '14
Arch Linux Security Advisory ASA-201412-3 ========================================= Severity: Critical Date : 2014-12-03 CVE-ID : CVE-2014-1587 CVE-2014-1588 CVE-2014-1589 CVE-2014-1590 CVE-2014-1591 CVE-2014-1592 CVE-2014-1593 CVE-2014-1594 CVE-2014-8631 CVE-2014-8632 Package : firefox Type : multiple issues Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package firefox before version 34.0.5-1 is vulnerable to multiple issues, including denial of service, information leak and remote code execution. Resolution ========== Upgrade to 34.0.5-1. # pacman -Syu "firefox>=34.0.5-1" The problem has been fixed upstream in version 34.0.5. Workaround ========== None. Description =========== CVE-2014-1587: Gary Kwong, Randell Jesup, Nils Ohlmeier, Jesse Ruderman, and Max Jonas Werner reported memory safety problems and crashes that affect Firefox ESR 31.2 and Firefox 33. CVE-2014-1588: Christian Holler, Gary Kwong, Jon Coppeard, Eric Rahm, Byron Campen, Eric Rescorla, and Xidorn Quan reported memory safety problems and crashes that affect Firefox 33. CVE-2014-1589: Security researcher Cody Crews reported a method to trigger chrome level XML Binding Language (XBL) bindings through web content. This was possible because some chrome accessible CSS stylesheets had their primary namespace improperly declared. When this occurred, it was possible to use these stylesheets to manipulate XBL bindings, allowing web content to bypass security restrictions. This issue was limited to a specific set of stylesheets. CVE-2014-1590: Security researcher Joe Vennix from Rapid7 reported that passing a JavaScript object to XMLHttpRequest that mimics an input stream will a crash. This crash is not exploitable and can only be used for denial of service attacks. CVE-2014-1591: Security researcher Muneaki Nishimura discovered that Content Security Policy (CSP) violation reports triggered by a redirect did not remove path information as required by the CSP specification. This potentially reveals information about the redirect that would not otherwise be known to the original site. This could be used by a malicious site to obtain sensitive information such as usernames or single-sign-on tokens encoded within the target URLs. CVE-2014-1592: Security researcher Berend-Jan Wever reported a use-after-free created by triggering the creation of a second root element while parsing HTML written to a document created with document.open(). This leads to a potentially exploitable crash. CVE-2014-1593: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover a buffer overflow during the parsing of media content. This leads to a potentially exploitable crash. CVE-2014-1594: Security researchers Byoungyoung Lee, Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security Center (GTISC) reported a bad casting from the BasicThebesLayer to BasicContainerLayer, resulting in undefined behavior. This behavior is potentially exploitable with some compilers but no clear mechanism to trigger it through web content was identified. CVE-2014-8631: CVE-2014-8632: Privileged access to security wrapped protected objects. Both of these issues could allow web content to access DOM objects that are intended to be chrome-only. Impact ====== A remote attacker, controlling a malicious website or in position of man-in-the-middle might be able to steal sensitive information, crash the firefox browser or execute arbitrary code. References ========== https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1587 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1588 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1589 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1590 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1591 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1592 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1593 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1594 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8631 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8632 https://www.mozilla.org/fr/security/known-vulnerabilities/firefox/
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201412-2] openvpn: denial of service
by Levente Polyak 02 Dec '14

02 Dec '14
Arch Linux Security Advisory ASA-201412-2 ========================================= Severity: High Date : 2014-12-02 CVE-ID : CVE-2014-8104 Package : openvpn Type : denial of service Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package openvpn before version 2.3.6-1 is vulnerable to denial of service. Resolution ========== Upgrade to 2.3.6-1. # pacman -Syu "openvpn>=2.3.6-1" The problem has been fixed upstream [0] in version 2.3.6. Workaround ========== None. Description =========== It was discovered that an authenticated client could trigger an ASSERT() in OpenVPN by sending a too-short control channel packet to the server. This could cause the OpenVPN server to crash and deny access to the VPN to other legitimate users. Impact ====== A remote authenticated attacker could send specially crafted packets that could cause the OpenVPN server to crash leading to denial of service of other legitimate users. References ========== [0] https://github.com/OpenVPN/openvpn/commit/c5590a https://access.redhat.com/security/cve/CVE-2014-8104 https://forums.openvpn.net/topic17625.html https://bugs.archlinux.org/task/42975
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201412-1] gnupg: denial of service
by Remi Gacogne 01 Dec '14

01 Dec '14
Arch Linux Security Advisory ASA-201412-1 ========================================= Severity: Medium Date : 2014-12-01 CVE-ID : CVE-2014-9087 Package : gnupg Type : denial of service Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package gnupg before version 2.1.0-6 is vulnerable to the same denial of service issue than the one in libska (ASA-201411-31), as they share the same code. Resolution ========== Upgrade to 2.1.0-6. # pacman -Syu "gnupg>=2.1.0-6" The problem has been fixed upstream but no new version has been released yet for the 2.1.x branch. Workaround ========== None. Description =========== By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow. The bug is not easy to exploit because there only 80 possible values which can be used to overwrite memory. However, a denial of service is possible and someone may come up with other clever attacks. Thus this should be fix. Background: Hanno Böck found an invalid memory access in the 2.1 branch of GnuPG by conveying a malformed OID as part of an ECC key. It turned out that this bug has also been in libksba ever since and affects at least gpgsm and dirmngr. The code to convert an OID to its string representation has an obvious error of not considering an invalid encoding for arc-2. A first byte of 0x80 can be used to make a value of less then 80 and we then subtract 80 from it as required by the OID encoding rules. Due to the use of an unsigned integer this results in a pretty long value which won't fit anymore into the allocated buffer. Impact ====== A remote attacker can cause a denial of service by sending a specially crafted S/MIME message or ECC based OpenPGP data. References ========== http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9087 http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html http://seclists.org/oss-sec/2014/q4/801 https://bugs.archlinux.org/task/42943
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201411-33] libjpeg-turbo: denial of service
by Remi Gacogne 28 Nov '14

28 Nov '14
Arch Linux Security Advisory ASA-201411-33 ========================================== Severity: Medium Date : 2014-11-28 CVE-ID : CVE-2014-9092 Package : libjpeg-turbo Type : denial of service Remote : No Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package libjpeg-turbo before version 1.3.1-3 is vulnerable to denial of service. Resolution ========== Upgrade to 1.3.1-3. # pacman -Syu "libjpeg-turbo>=1.3.1-3" The problem has been fixed upstream but a new version has not been released yet. Workaround ========== None. Description =========== Special crafted jpeg files lead to stack smashing and lead to at least a dos (maybe remote due to imagick). The Huffman encoder's local buffer can be overrun when a buffered destination manager is being used and an extremely-high-frequency block (basically junk image data) is being encoded. Even though the Huffman local buffer was increased from 128 bytes to 136 bytes to address the previous issue, the new issue caused even the larger buffer to be overrun. Further analysis reveals that, in the absolute worst case (such as setting alternating AC coefficients to 32767 and -32768 in the JPEG scanning order), the Huffman encoder can produce encoded blocks that approach double the size of the unencoded blocks. Thus, the Huffman local buffer was increased to 256 bytes, which should prevent any such issue from re-occurring in the future. Impact ====== An attacker can cause a denial of service or other unspecified impact by supplying a specially crafted JPEG file. References ========== http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9092 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768369 http://sourceforge.net/p/libjpeg-turbo/code/1427/ https://bugs.archlinux.org/task/42922
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201411-32] icecast: information leak
by Remi Gacogne 28 Nov '14

28 Nov '14
Arch Linux Security Advisory ASA-201411-32 ========================================== Severity: Critical Date : 2014-11-28 CVE-ID : CVE-2014-9018 Package : icecast Type : information leak Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package icecast before version 2.4.1-1 is vulnerable to information leak. Resolution ========== Upgrade to 2.4.1-1. # pacman -Syu "icecast>=2.4.1-1" The problem has been fixed upstream in version 2.4.1. Workaround ========== Disable on-connect and on-disconnect scripts. Description =========== It was reported that Icecast could possibly leak the contents of on-connect scripts to clients, which may contain sensitive information. If on-connect/on-disconnect scripts are used, file descriptors of the server process remain open and could be written to or read from. Most pressing STDIN, STDOUT, STDERR are handled. Further all file descriptors up to 1024 are closed. There is a remaining (much lower) risk in combination of either a malicious or susceptible script and FDs above 1024. Impact ====== A remote attacker may be able to extract sensitive information from the process memory, including but not limited to passwords. References ========== http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9018 http://icecast.org/news/icecast-release-2_4_1/ https://trac.xiph.org/ticket/2087 https://bugs.archlinux.org/task/42912 http://seclists.org/oss-sec/2014/q4/716
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201411-31] libksba: denial of service
by Remi Gacogne 28 Nov '14

28 Nov '14
Arch Linux Security Advisory ASA-201411-31 ========================================== Severity: Medium Date : 2014-11-28 CVE-ID : CVE-2014-9087 Package : libksba Type : denial of service Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package libksba before version 1.3.2-1 is vulnerable to denial of service. Resolution ========== Upgrade to 1.3.2-1. # pacman -Syu "libksba>=1.3.2-1" The problem has been fixed upstream in version 1.3.2. Workaround ========== None. Description =========== By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow. The bug is not easy to exploit because there only 80 possible values which can be used to overwrite memory. However, a denial of service is possible and someone may come up with other clever attacks. Thus this should be fix. Background: Hanno Böck found an invalid memory access in the 2.1 branch of GnuPG by conveying a malformed OID as part of an ECC key. It turned out that this bug has also been in libksba ever since and affects at least gpgsm and dirmngr. The code to convert an OID to its string representation has an obvious error of not considering an invalid encoding for arc-2. A first byte of 0x80 can be used to make a value of less then 80 and we then subtract 80 from it as required by the OID encoding rules. Due to the use of an unsigned integer this results in a pretty long value which won't fit anymore into the allocated buffer. Impact ====== A remote attacker can cause a denial of service by sending a specially crafted S/MIME message or ECC based OpenPGP data. References ========== http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9087 http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html http://seclists.org/oss-sec/2014/q4/801
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201411-30] flac: arbitrary code execution
by Remi Gacogne 26 Nov '14

26 Nov '14
Arch Linux Security Advisory ASA-201411-30 ========================================== Severity: High Date : 2014-11-26 CVE-ID : CVE-2014-8962 CVE-2014-9028 Package : flac Type : arbitrary code execution Remote : No Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package flac before version 1.3.0-5 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 1.3.0-5. # pacman -Syu "flac>=1.3.0-5" The problem has been fixed upstream in version 1.3.1-pre1. Workaround ========== None. Description =========== A stack overflow and a heap overflow condition have been found in libFLAC when parsing a maliciously crafted .flac file, which may result in arbitrary code execution. Impact ====== An attacker can execute arbitrary code by supplying a specially crafted .flac file to the libFLAC decoder. References ========== http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8962 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9028 http://www.ocert.org/advisories/ocert-2014-008.html https://bugs.archlinux.org/task/42898
1 0
0 0
[arch-security] [Arch Linux Security Advisory ASA-201411-29] pcre: heap buffer overflow
by Remi Gacogne 26 Nov '14

26 Nov '14
Arch Linux Security Advisory ASA-201411-29 ========================================== Severity: Low Date : 2014-11-26 CVE-ID : CVE-2014-8964 Package : pcre Type : heap buffer overflow Remote : No Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package pcre before version 8.36-2 is vulnerable to denial of service via a heap buffer overlow. Resolution ========== Upgrade to 8.36-2. # pacman -Syu "pcre>=8.36-2" The problem has been fixed upstream but no version released yet. Workaround ========== None. Description =========== A heap buffer overflow issue was found in PCRE when processing a specially crafted regular expression, causing a denial of service or other unspecified impact. Impact ====== An attacker able to supply a specially crafted regular expression can cause a denial of service, or other unspecified impact. References ========== http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8964 http://bugs.exim.org/show_bug.cgi?id=1546 https://bugs.archlinux.org/task/42860
1 0
0 0
  • ← Newer
  • 1
  • ...
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • ...
  • 191
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.