Go offline with the Player FM app!
Episode 38
Manage episode 237246840 series 2423058
Overview
This week we look at the latest security updates for the Linux kernel, Firefox, ImageMagick, OpenStack and more, plus we have a special guest, the maintainer and lead developer of the AppArmor project, John Johansen, to talk about the project and some of the upcoming features.
This week in Ubuntu Security Updates
55 unique CVEs addressed
[USN-4031-1] Linux kernel vulnerability
- 1 CVEs addressed in Bionic, Cosmic, Disco
- 64-bit PowerPC (ppc64el) memory management issue - introduced in the 4.17 kernel - so only affects Cosmic/Disco or Bionic when using the HWE kernel
- Different processes might be able to read / write to each others virtual memory
- Requirements:
- Must be using the hash page table MMU - eg. PowerPC 970 (G5), PA6T, Power5/6/7/8/9
- By default Power9 bare-metal use the Radix MMU so are not affected unless have explicitly disabled this via the kernel command-line
- KVM guests would also be affected in this case or if also explicitly configured to use the HPT MMU
- Logical partitions (LPARs) under PowerVM on Power9 would be affected as they always use HPT MMU
- Need to allocate memory above 512TB - only possible via mmap()
- Any child process (fork()) receives same context-id for the memory mapping so can just read/write to the mappings above 512TB
- If child exits, a 3rd process could be reallocated the same context-id and so could then read/write also
- Must be using the hash page table MMU - eg. PowerPC 970 (G5), PA6T, Power5/6/7/8/9
- Requirements:
- Only a subset of PowerPC systems will be affected by this and would need to be running applications which allocate above 512TB so whilst is high impact, low probability of being at risk
[USN-4032-1] Firefox vulnerability
- 1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
- Firefox 67.0.4 - latest upstream release
- Possible for a sandboxed child process to escape the sandbox by using IPC to send a Prompt:Open message to the parent which would then process web-content on behalf of the child
- Since parent is not sandboxed, it could be then exploited (say by leveraging another vulnerability such as the one discussed last week for Firefox) for arbitrary code execution
[USN-4033-1] libmysofa vulnerability
- 1 CVEs addressed in Bionic, Cosmic, Disco
- C library to read SOFA (Spatially Oriented Format for Acoustics) files
- Used by lots of different applications that handle audio, like gstreamer, ffmpeg, smplayer, blender etc
- Integer overflow leading to buffer overflow - crash -> DoS or possible code-execution
[USN-4034-1] ImageMagick vulnerabilities
- 30 CVEs addressed in Xenial, Bionic, Cosmic, Disco
- CVE-2019-9956
- CVE-2019-7398
- CVE-2019-7397
- CVE-2019-7396
- CVE-2019-7395
- CVE-2019-7175
- CVE-2019-11598
- CVE-2019-11597
- CVE-2019-11472
- CVE-2019-11470
- CVE-2019-10650
- CVE-2019-10649
- CVE-2019-10131
- CVE-2018-20467
- CVE-2018-18544
- CVE-2018-18025
- CVE-2018-18024
- CVE-2018-18023
- CVE-2018-18016
- CVE-2018-17966
- CVE-2018-17965
- CVE-2018-16645
- CVE-2018-16644
- CVE-2018-16413
- CVE-2018-16412
- CVE-2018-16323
- CVE-2018-15607
- CVE-2018-14434
- CVE-2017-12806
- CVE-2017-12805
- Used by many automated systems for image processing etc
- Many memory corruption issues fixed - most able to cause at least a crash (DoS) but might be possible to also get RCE
- Also updated the default policy to disable support for PostScript and PDF formats (since these are handle by GhostScript which has a long history of security issues itself) - Cosmic + Disco
- This is already the case on Bionic (USN-3785-1 - Episode 7)
[USN-4035-1] Ceph vulnerabilities
- 4 CVEs addressed in Xenial, Cosmic, Disco
- 2 CVEs affect ceph in Xenial
- dm-crypt disk encryption keys were able to be read by users with read-only permissions - fixed to ensure need an explicit permission to read keys
- DoS from authenticated RGW users
- 2 Cosmic+Disco
- Does not properly sanitize encryption keys when outputting debug log information for v4 auth -so encryption keys would be output in plaintext to debug logs
- fixed to sanitize before output
- won’t be fixed for Xenial since upstream hasn’t backported this and there are many instances of other sensitive info being logged there as well
- DoS by unauthenticated remote users via the civetweb frontend - as they could create connections to a RADOS gateway to exhaust file descriptors for the gateway service causing it to run out and fail to create new connections
- Close fd on error path
- Does not properly sanitize encryption keys when outputting debug log information for v4 auth -so encryption keys would be output in plaintext to debug logs
[USN-4036-1] OpenStack Neutron vulnerability
- 1 CVEs addressed in Xenial, Cosmic
- Networking abstraction layer of OpenStack
- Allows to define security groups with rules which then get executed by a driver using a particular underlying technology
- Rules can specify protocols and source / destination ports
- iptables driver would execute rules but if encountered an error (such as a protocol was specified along with a port but the protocol doesn’t support ports - like VRRP) then it would error out and not apply further rules from the security group
- So could block other rules from being applied
- Fixed to ensure port arguments are only applied to protocols which support them
[USN-4037-1] policykit-desktop-privileges update
- Affecting Xenial, Bionic, Cosmic, Disco
- PolicyKit policy update for USB Creator
- Previously would allow a user with admin privileges (ie. in the admin/sudo group) to overwrite disks (ie create bootable USB images) without prompting for authentication
- Now updated to require the user to also authenticate as well
[USN-4038-1, USN-4038-2] bzip2 vulnerabilities
- 2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
- UAF via crafted bzip2 file - crash, DoS
- OOB write from crafted bzip2 which contains too many selectors - possible RCE
- Turns out this breaks decompression of some bzip2 files created by the lbzip2 utility since it would use an invalid number of selectors - upstream still pondering how to fix this
[USN-4040-1, USN-4040-2] Expat vulnerability
- 1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
- CPU DoS if XML names contained large number of colons (used to specify namespace prefix)
[USN-4042-1] poppler vulnerabilities
- 13 CVEs addressed in Xenial, Bionic, Cosmic, Disco
- Usual mix of issues
- Memory leak
- Stack exhaustion -> crash, DoS
- 3*Heap-based buffer over-reads
- NULL pointer dereference
- Various floating point exception issues
- Assertion failure
- Heap-based buffer under-write - so write at a negative index of a heap allocated buffer - crash, DoS or possible RCE via heap metadata or object corruption
[USN-4041-1, USN-4041-2] Linux kernel update
- 1 CVEs addressed in Trusty ESM (HWE), Xenial, Bionic, Cosmic, Disco
- Final SACK Panic issue (Episode 37) - added sysctl to easily set MSS (is usually hard-coded to 48) - so can be increased to avoid this DoS issue
Goings on in Ubuntu Security Community
AppArmor interview with John Johansen
Hiring
Robotics Security Engineer
Ubuntu Security Engineer
Get in contact
230 episodes
Manage episode 237246840 series 2423058
Overview
This week we look at the latest security updates for the Linux kernel, Firefox, ImageMagick, OpenStack and more, plus we have a special guest, the maintainer and lead developer of the AppArmor project, John Johansen, to talk about the project and some of the upcoming features.
This week in Ubuntu Security Updates
55 unique CVEs addressed
[USN-4031-1] Linux kernel vulnerability
- 1 CVEs addressed in Bionic, Cosmic, Disco
- 64-bit PowerPC (ppc64el) memory management issue - introduced in the 4.17 kernel - so only affects Cosmic/Disco or Bionic when using the HWE kernel
- Different processes might be able to read / write to each others virtual memory
- Requirements:
- Must be using the hash page table MMU - eg. PowerPC 970 (G5), PA6T, Power5/6/7/8/9
- By default Power9 bare-metal use the Radix MMU so are not affected unless have explicitly disabled this via the kernel command-line
- KVM guests would also be affected in this case or if also explicitly configured to use the HPT MMU
- Logical partitions (LPARs) under PowerVM on Power9 would be affected as they always use HPT MMU
- Need to allocate memory above 512TB - only possible via mmap()
- Any child process (fork()) receives same context-id for the memory mapping so can just read/write to the mappings above 512TB
- If child exits, a 3rd process could be reallocated the same context-id and so could then read/write also
- Must be using the hash page table MMU - eg. PowerPC 970 (G5), PA6T, Power5/6/7/8/9
- Requirements:
- Only a subset of PowerPC systems will be affected by this and would need to be running applications which allocate above 512TB so whilst is high impact, low probability of being at risk
[USN-4032-1] Firefox vulnerability
- 1 CVEs addressed in Xenial, Bionic, Cosmic, Disco
- Firefox 67.0.4 - latest upstream release
- Possible for a sandboxed child process to escape the sandbox by using IPC to send a Prompt:Open message to the parent which would then process web-content on behalf of the child
- Since parent is not sandboxed, it could be then exploited (say by leveraging another vulnerability such as the one discussed last week for Firefox) for arbitrary code execution
[USN-4033-1] libmysofa vulnerability
- 1 CVEs addressed in Bionic, Cosmic, Disco
- C library to read SOFA (Spatially Oriented Format for Acoustics) files
- Used by lots of different applications that handle audio, like gstreamer, ffmpeg, smplayer, blender etc
- Integer overflow leading to buffer overflow - crash -> DoS or possible code-execution
[USN-4034-1] ImageMagick vulnerabilities
- 30 CVEs addressed in Xenial, Bionic, Cosmic, Disco
- CVE-2019-9956
- CVE-2019-7398
- CVE-2019-7397
- CVE-2019-7396
- CVE-2019-7395
- CVE-2019-7175
- CVE-2019-11598
- CVE-2019-11597
- CVE-2019-11472
- CVE-2019-11470
- CVE-2019-10650
- CVE-2019-10649
- CVE-2019-10131
- CVE-2018-20467
- CVE-2018-18544
- CVE-2018-18025
- CVE-2018-18024
- CVE-2018-18023
- CVE-2018-18016
- CVE-2018-17966
- CVE-2018-17965
- CVE-2018-16645
- CVE-2018-16644
- CVE-2018-16413
- CVE-2018-16412
- CVE-2018-16323
- CVE-2018-15607
- CVE-2018-14434
- CVE-2017-12806
- CVE-2017-12805
- Used by many automated systems for image processing etc
- Many memory corruption issues fixed - most able to cause at least a crash (DoS) but might be possible to also get RCE
- Also updated the default policy to disable support for PostScript and PDF formats (since these are handle by GhostScript which has a long history of security issues itself) - Cosmic + Disco
- This is already the case on Bionic (USN-3785-1 - Episode 7)
[USN-4035-1] Ceph vulnerabilities
- 4 CVEs addressed in Xenial, Cosmic, Disco
- 2 CVEs affect ceph in Xenial
- dm-crypt disk encryption keys were able to be read by users with read-only permissions - fixed to ensure need an explicit permission to read keys
- DoS from authenticated RGW users
- 2 Cosmic+Disco
- Does not properly sanitize encryption keys when outputting debug log information for v4 auth -so encryption keys would be output in plaintext to debug logs
- fixed to sanitize before output
- won’t be fixed for Xenial since upstream hasn’t backported this and there are many instances of other sensitive info being logged there as well
- DoS by unauthenticated remote users via the civetweb frontend - as they could create connections to a RADOS gateway to exhaust file descriptors for the gateway service causing it to run out and fail to create new connections
- Close fd on error path
- Does not properly sanitize encryption keys when outputting debug log information for v4 auth -so encryption keys would be output in plaintext to debug logs
[USN-4036-1] OpenStack Neutron vulnerability
- 1 CVEs addressed in Xenial, Cosmic
- Networking abstraction layer of OpenStack
- Allows to define security groups with rules which then get executed by a driver using a particular underlying technology
- Rules can specify protocols and source / destination ports
- iptables driver would execute rules but if encountered an error (such as a protocol was specified along with a port but the protocol doesn’t support ports - like VRRP) then it would error out and not apply further rules from the security group
- So could block other rules from being applied
- Fixed to ensure port arguments are only applied to protocols which support them
[USN-4037-1] policykit-desktop-privileges update
- Affecting Xenial, Bionic, Cosmic, Disco
- PolicyKit policy update for USB Creator
- Previously would allow a user with admin privileges (ie. in the admin/sudo group) to overwrite disks (ie create bootable USB images) without prompting for authentication
- Now updated to require the user to also authenticate as well
[USN-4038-1, USN-4038-2] bzip2 vulnerabilities
- 2 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
- UAF via crafted bzip2 file - crash, DoS
- OOB write from crafted bzip2 which contains too many selectors - possible RCE
- Turns out this breaks decompression of some bzip2 files created by the lbzip2 utility since it would use an invalid number of selectors - upstream still pondering how to fix this
[USN-4040-1, USN-4040-2] Expat vulnerability
- 1 CVEs addressed in Precise ESM, Trusty ESM, Xenial, Bionic, Cosmic, Disco
- CPU DoS if XML names contained large number of colons (used to specify namespace prefix)
[USN-4042-1] poppler vulnerabilities
- 13 CVEs addressed in Xenial, Bionic, Cosmic, Disco
- Usual mix of issues
- Memory leak
- Stack exhaustion -> crash, DoS
- 3*Heap-based buffer over-reads
- NULL pointer dereference
- Various floating point exception issues
- Assertion failure
- Heap-based buffer under-write - so write at a negative index of a heap allocated buffer - crash, DoS or possible RCE via heap metadata or object corruption
[USN-4041-1, USN-4041-2] Linux kernel update
- 1 CVEs addressed in Trusty ESM (HWE), Xenial, Bionic, Cosmic, Disco
- Final SACK Panic issue (Episode 37) - added sysctl to easily set MSS (is usually hard-coded to 48) - so can be increased to avoid this DoS issue
Goings on in Ubuntu Security Community
AppArmor interview with John Johansen
Hiring
Robotics Security Engineer
Ubuntu Security Engineer
Get in contact
230 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.