USN-6534-3: Linux kernel vulnerabilities

Read Time:2 Minute, 52 Second

It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel did not properly initialize a policy data structure, leading
to an out-of-bounds vulnerability. A local privileged attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3773)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)

It was discovered that a race condition existed in QXL virtual GPU driver
in the Linux kernel, leading to a use after free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-39198)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)

Read More

USN-6555-1: X.Org X Server vulnerabilities

Read Time:24 Second

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled XKB
button actions. An attacker could possibly use this issue to cause the X
Server to crash, execute arbitrary code, or escalate privileges.
(CVE-2023-6377)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the RRChangeOutputProperty and
RRChangeProviderProperty APIs. An attacker could possibly use this issue to
cause the X Server to crash, or obtain sensitive information.
(CVE-2023-6478)

Read More

llhttp-9.1.3-1.el9 python-aiohttp-3.9.1-1.el9

Read Time:58 Second

FEDORA-EPEL-2023-4b1b8b8b25

Packages in this update:

llhttp-9.1.3-1.el9
python-aiohttp-3.9.1-1.el9

Update description:

Security fix for CVE-2023-47627, CVE-2023-49081, CVE-2023-49082.

https://pagure.io/epel/issue/262

python-aiohttp 3.9.1 (2023-11-26)

https://github.com/aio-libs/aiohttp/blob/v3.9.1/CHANGES.rst#391-2023-11-26

python-aiohttp 3.9.0 (2023-11-17)

https://github.com/aio-libs/aiohttp/blob/v3.9.1/CHANGES.rst#390-2023-11-18

python-aiohttp 3.8.6 (2023-10-07)

https://github.com/aio-libs/aiohttp/blob/v3.9.1/CHANGES.rst#386-2023-10-07

llhttp 9.1.3

Fixes

Restart the parser on HTTP 100
Fix chunk extensions quoted-string value parsing
Fix lenient_flags truncated on reset
Fix chunk extensions’ parameters parsing when more then one name-value pair provided

llhttp 9.1.2

What’s Changed

Fix HTTP 1xx handling

llhttp 9.1.1

What’s Changed

feat: Expose new lenient methods

llhttp 9.1.0

What’s Changed

New lenient flag to make CR completely optional
New lenient flag to have spaces after chunk header

Read More

Surveillance by the US Postal Service

Read Time:25 Second

This is not about mass surveillance of mail, this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves:

To track down an alleged mail thief, a US postal inspector used license plate reader technology, GPS data collected by a rental car company, and, most damning of all, hid a camera inside one of the targeted blue post boxes which captured the suspect’s full face as they allegedly helped themselves to swathes of peoples’ mail.

Read More

What is data-centric security?

Read Time:6 Minute, 8 Second

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. 

Data is the lifeblood of organizations. It drives decision-making, fosters innovation, and underpins business operations. However, this wealth of data is scattered across multiple cloud platforms, making it an attractive target for cybercriminals, and rendering traditional approaches to data protection obsolete. This is where data-centric security comes into play. This article will explore the concept of data-centric security, why businesses need it, and the benefits it offers.

Understanding data-centric security

Data-centric security is a comprehensive approach to safeguarding sensitive data by focusing on the data itself rather than the network or perimeter. It revolves around protecting data throughout its lifecycle, ensuring that even if security perimeters are breached, the data remains secure.

Data-centric security comprises several key components and principles, including:

Data discovery and classification: Identifying and categorizing data based on its sensitivity is the first step in protecting it. By knowing what data is most critical, you can allocate resources and protection measures accordingly.
Access controls and permissions: Fine-grained access controls and role-based permissions are essential to restrict data access to authorized users and roles, reducing the risk of data exposure.
Encryption: Encrypting data at rest and in transit adds an extra layer of protection, making data inaccessible to unauthorized individuals.
Activity monitoring: Real-time activity monitoring and auditing capabilities help detect unusual data access or transfer patterns, allowing for immediate response to potential security incidents.
Incident response and mitigation: Effective incident response is crucial in case of a breach or unauthorized access, enabling quick identification of the issue and mitigating any damage.

Why businesses need data-centric security

The amount of data being used by organizations for day-to-day operations is increasing rapidly. The importance of adopting a data-centric approach to data protection can be summarized into three main reasons:

1. Traditional security is insufficient.

Businesses leverage multiple cloud environments, and sensitive data, such as personal information or intellectual property, are migrated and sprawled across these platforms, expanding the attack surface. Data vulnerabilities become increasingly common when network perimeters are hard to define in a hybrid work environment. Applying safeguards directly to data is needed to create more barriers that repel unauthorized data distribution. Data-centric security protects data from all kinds of threats, such as external attackers or negligent employees.

2. Apply granular access controls.

Data-centric security is a vital approach to protect your data dynamically. It enables you to have more flexibility in managing your systems and networks by providing fine-grained access controls, which are more effective than traditional access controls. This framework is particularly critical in scenarios where not every user should have access to the entire data within their department.

3. Integrate with existing tech stack.

Data-centric security is an effective way to protect a company’s data from cyber threats. It can be added to existing infrastructure without disrupting normal operations or requiring drastic changes. This allows companies to gradually improve their security measures while freeing up resources for other purposes.

Benefits of data-centric security

As data becomes increasingly valuable as a competitive advantage, organizations have increased their cybersecurity spending. Investing in data-centric security controls offers many benefits, which are outlined below.

Lower data protection costs

By focusing on the data itself, data-centric security ultimately reduces the potential of costly data breaches. Many reports highlight that data is the prime target of attackers and that the cost of a data breach increases yearly. It can also lower the cost of maintaining compliance, which often requires updating equipment, systems, and their underlying technology.

A secure remote workforce

Technological changes and the need to satisfy trends for flexible work have accelerated the adoption of a hybrid workforce. However, the proliferation of remote endpoints outside the traditional corporate perimeter drastically increased the security risks posed to data. Adopting a data-centric solution that protects data wherever it goes reduces the risks highlighted by remote work.

Improve security at the file level

Ensuring data security is no longer just about focusing on the infrastructure. With the shift towards data-centric security, there is greater emphasis on securing individual files. This approach enables better tracking, storage, and protection of data. Moreover, file-level security enables the implementation of robust encryption mechanisms, along with strong access controls and policy enforcement. By prioritizing document security, it becomes easier to manage user access to resources and control what they can access and when.

Platform-agnostic data security

Data-centric security helps organizations avoid dependence on any specific system or device. Rather than relying on a particular platform, organizations can build strong cybersecurity practices that provide flexibility in data management, especially with their supply chains. This is crucial because while security infrastructure can strengthen a system, it can also create a situation where security becomes the end goal rather than the means to protect an organization’s valuable data. Data-centric solutions also reduce the risks of data silos and minimize harm in case of a systemic failure.

How to create a data-centric security model

Creating a genuine data-centric security model requires adopting a defense-in-depth strategy that encloses data in successive layers of security. Defense-in-depth provides sufficient redundancies that act as barricades of increasing complexity from one layer of security to the next.

Data discovery and classification

To build a comprehensive data-centric model, the first step is to inventory your organization’s data across its ecosystem. It is essential to know where your data is located and how it is stored before implementing any security measures. Next, correctly classify this data to understand its value and prioritize the level of protection it deserves. Security administrators can then deploy accurate protection measures for each category of data.

Identity and access management (IAM)

Identity and access management (IAM) plays a critical role in providing robust data-centric security. Robust IAM allows only authorized users to access sensitive data in accordance with the principle of least privilege, providing effective controls to avoid any unauthorized exposure to sensitive information.

Data governance

To be truly effective, data-centric security must adhere to industry-specific and governmental regulations, including national and international mandates, such as GDPR or HIPAA. Data governance is crucial to comply with these regulations, and organizations must periodically conduct risk assessments to ensure they are maintaining compliance.

Data loss prevention (DLP)

One of the best ways to approach data-centric security is to incorporate a data loss prevention solution that meets their business needs for data protection. DLP excels in preventing data from entering into the wrong hands or being exposed to unauthorized access by detecting and preventing data compromise from breaches, leakages, and exfiltration.

Conclusion

Data-centric security is a vital approach to protecting sensitive data in an increasingly interconnected world. It not only safeguards your critical assets but also helps with compliance, intellectual property protection, and reducing the impact of data breaches. By following the guidelines for selecting data-centric security tools and solutions, organizations can fortify their data defenses and maintain a strong competitive edge in today’s digital landscape.

Invest in data-centric security measures to secure your organization’s most valuable asset: its data.

Read More