Awesome
A list of publicly known but unfixed security bugs
Please submit a pull request if you have corrections or know about any other unfixed security bugs.
tar
Chrome
Pretty much every terminal emulator
sudo
-
When running
sudo -u non-root-user
as root,TIOCSTI
allows thecommand
insudo -u non-root-user command
to execute anything as root. Can be fixed withDefaults use_pty
insudoers
. More notes. -
sudo credential caching (generally enabled by default; disabled with
Defaults timestamp_timeout=0
) allows any process in a TTY to do a passwordless sudo within the timeout period, not just commands that you've prefixed withsudo
in the shell.
VirtualBox
- Unlike VMware Workstation, VirtualBox clipboard sharing gives guests continuous access to the host clipboard, instead of just when the VM is focused.
virt-manager/spice-gtk
- Unlike VMware Workstation, virt-manager/spice-gtk clipboard sharing gives guests continuous access to the host clipboard, instead of just when the VM is focused. This clipboard sharing feature is unconditionally enabled without warning. A compromised guest with no need for clipboard access can install
spice-vdagent
and start continuously sniffing the host clipboard.
Xorg
- Any program connected to the server can sniff another program's keystrokes. Solved in Wayland.
Node
Erlang/OTP
-
You can crash a distributed Erlang node by making ~1M connections with an invalid security cookie
-
Check for null bytes in binaries / strings when opening files (to be fixed in OTP 21.0)
Twisted
-
Credentials materials are compared unsafely throughout Twisted, still open due to the difficulty of measuring whether the constant-time compare function actually fixes anything.
-
twisted.web has no protection against HTTP response-splitting attacks
WeeChat
phantomjs, libqtwebkit4, libqt5webkit5
- These packages exist in a state of permanent insecurity because they don't keep up with the ~6-week browser update cycle. (e.g. take any one of the many WebKit security bugs fixed after the last release of these packages, which could be a ~year old.)
Windows
-
Windows Defender's malware emulator is unsandboxed and runs with SYSTEM privileges
-
Various methods of automatically bypassing UAC (see "Unfixed methods in upcoming Windows 10 RS2 release")
Packages in your Linux distribution
- Debian stable
- Debian testing
- Debian unstable
- Ubuntu main archive
- Ubuntu universe archive
- Ubuntu partner archive
- Arch Linux