Stories
Slash Boxes
Comments

SoylentNews is people

posted by n1 on Tuesday November 29 2016, @11:56AM   Printer-friendly
from the lost-my-keys dept.

Submitted via IRC for Bytram

Microsoft has patched flaws that attackers could exploit to compromise all Azure Red Hat Enterprise Linux (RHEL) instances.

Software engineer Ian Duffy found the flaws while building a secure RHEL image for Microsoft Azure. [...] Duffy says all Azure RHEL images are configured without GPG validation checks meaning all would accept malicious package updates on their next run of yum updates.

[...] Duffy found another vulnerability within the mandatory Microsoft Azure Linux Agent (WaLinuxAgent) which exposed API keys for debugging purposes.

[...] Duffy says he was paid less than US$3500 for the vulnerability disclosures under Microsoft's bug bounty but did not name a precise figure.

Source: The Register


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by TheRaven on Tuesday November 29 2016, @03:19PM

    by TheRaven (270) on Tuesday November 29 2016, @03:19PM (#434490) Journal
    Unlikely. This is Azure, which employs a lot of Linux (and FreeBSD) developers. Most likely, they're rolling their own packages with tweaks for Azure and set their default image to fetch from there instead. They didn't bother adding a new signing key because (a) it's hard to do key management securely, and (b) they thought that there was no need given that they controlled the server, the client, and the network between the two. Only it turns out that that's not quite true.
    --
    sudo mod me up
    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3